First published: Mon Aug 19 2024(Updated: )
An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access.
Affected Software | Affected Version | How to fix |
---|---|---|
Gunicorn | <22.0 | |
The Foreman | ||
Red Hat Satellite | >=6.13<6.16 | |
Pulpcore | >=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2305718 is critical due to the authentication bypass vulnerability.
To fix REDHAT-BUG-2305718, upgrade Gunicorn to version 22.0 or later and ensure proper configuration of puppet-foreman.
Gunicorn versions prior to 22.0 are affected by REDHAT-BUG-2305718.
Foreman, Satellite (versions 6.13 to 6.16), and Pulpcore (version 4.0 and above) are also impacted by REDHAT-BUG-2305718.
The vulnerability in REDHAT-BUG-2305718 is caused by Apache's mod_proxy not properly unsetting headers due to restrictions on underscores in HTTP headers.