First published: Tue Jul 23 2024(Updated: )
An authentication bypass vulnerability exists in Foreman due to Pulpcore when deployed with Gunicorn versions earlier than 22.0. The issue arises from how Apache’s mod_proxy handles header as it fails to unset it properly due to restrictions on underscores in HTTP headers. This allow authentication through malformed header instead. This flaw affects all Katello/Satellite 6.10+ deployments using Pulpcore from version 4.0+ and could potentially allow unauthorized users to gain admin access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | =6.13 | |
Red Hat Satellite | =6.14 | |
Red Hat Satellite | =6.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-7012 is considered high due to its potential for authentication bypass.
To fix CVE-2024-7012, upgrade to Gunicorn version 22.0 or later.
CVE-2024-7012 affects Red Hat Satellite versions 6.13, 6.14, and 6.15.
CVE-2024-7012 is caused by how Apache’s mod_proxy improperly handles HTTP headers, leading to authentication bypass.
Currently, the recommended solution is to upgrade Gunicorn; there are no documented workarounds for CVE-2024-7012.