First published: Tue Jul 23 2024(Updated: )
An authentication bypass vulnerability exists in Foreman due to Pulpcore when deployed with Gunicorn versions earlier than 22.0. The issue arises from how Apache’s mod_proxy handles header as it fails to unset it properly due to restrictions on underscores in HTTP headers. This allow authentication through malformed header instead. This flaw affects all Katello/Satellite 6.10+ deployments using Pulpcore from version 4.0+ and could potentially allow unauthorized users to gain admin access.
Affected Software | Affected Version | How to fix |
---|---|---|
Gunicorn | <22.0 | |
>=4.0 | ||
>=6.10 | ||
Red Hat Network Satellite Server | >=6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2299429 is classified as a high-risk vulnerability due to the authentication bypass it causes.
To fix REDHAT-BUG-2299429, upgrade Gunicorn to version 22.0 or later, and ensure that your deployment of Pulpcore is updated accordingly.
Gunicorn versions earlier than 22.0 are affected by REDHAT-BUG-2299429.
REDHAT-BUG-2299429 impacts Gunicorn, Pulpcore, Red Hat Katello, and Red Hat Satellite versions specified.
Currently, the best practice is to upgrade to the latest versions of the affected software rather than relying on a workaround.