
26/7/2024

7/8/2024

7/8/2024

31/12/2024
CVE-2024-7143: Pulpcore: rbac permissions incorrectly assigned in tasks that create objects
First published: Fri Jul 26 2024(Updated: )
A flaw was found in the Pulp package. When a role-based access control (RBAC) object in Pulp is set to assign permissions on its creation, it uses the `AutoAddObjPermsMixin` (typically the add_roles_for_object_creator method). This method finds the object creator by checking the current authenticated user. For objects that are created within a task, this current user is set by the first user with any permissions on the task object. This means the oldest user with model/domain-level task permissions will always be set as the current user of a task, even if they didn't dispatch the task. Therefore, all objects created in tasks will have their permissions assigned to this oldest user, and the creating user will receive nothing.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
pip/pulpcore | <=3.56.0 | |
Pulp Project | | |
All of | | |
Pulp Project | | |
Red Hat Ansible Automation Platform | =2.0 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-7143?
CVE-2024-7143 has been classified as a critical vulnerability due to its potential for unauthorized access via role-based access control misconfigurations.
How do I fix CVE-2024-7143?
To mitigate CVE-2024-7143, upgrade the pulpcore package to a version higher than 3.56.0 which addresses this vulnerability.
Which versions of pulpcore are affected by CVE-2024-7143?
CVE-2024-7143 affects pulpcore versions up to and including 3.56.0.
What software components are impacted by CVE-2024-7143?
CVE-2024-7143 impacts the Pulp project implementations that utilize role-based access control.
Is Red Hat's Ansible Automation Platform vulnerable to CVE-2024-7143?
No, Red Hat's Ansible Automation Platform version 2.0 is not vulnerable to CVE-2024-7143.
- agent/weakness
- agent/type
- agent/author
- agent/title
- collector/epss-latest
- source/FIRST
- agent/epss
- agent/references
- collector/redhat-bugzilla
- source/Red Hat
- alias/CVE-2024-7143
- agent/severity
- agent/event
- agent/description
- agent/first-publish-date
- collector/github-advisory-latest
- source/GitHub
- alias/GHSA-9m5j-4xx9-44j9
- agent/software-canonical-lookup
- collector/github-advisory
- agent/trending
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/source
- agent/softwarecombine
- agent/tags
- collector/nvd-cve
- source/NVD
- agent/software-canonical-lookup-request
- collector/nvd-api
- package-manager/pip
- vendor/pulpproject
- canonical/pulp project
- vendor/redhat
- canonical/red hat ansible automation platform
- version/red hat ansible automation platform/2.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203