First published: Mon Aug 19 2024(Updated: )
An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | =6.13 | |
Red Hat Satellite | =6.14 | |
Red Hat Satellite | =6.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7923 is considered a critical severity vulnerability due to its potential for authentication bypass.
To fix CVE-2024-7923, upgrade Gunicorn to version 22.0 or later and ensure proper configuration of your Foreman deployment.
CVE-2024-7923 affects Red Hat Satellite versions 6.13, 6.14, and 6.15.
CVE-2024-7923 is classified as an authentication bypass vulnerability.
CVE-2024-7923 can potentially allow unauthorized access to sensitive resources by bypassing authentication mechanisms.