CVE-2024-7012

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:*

History

06 Nov 2024, 09:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:8906 -

05 Sep 2024, 21:39

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2024:6335 - () https://access.redhat.com/errata/RHSA-2024:6335 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6336 - () https://access.redhat.com/errata/RHSA-2024:6336 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:6337 - () https://access.redhat.com/errata/RHSA-2024:6337 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-7012 - () https://access.redhat.com/security/cve/CVE-2024-7012 - Mitigation, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2299429 - () https://bugzilla.redhat.com/show_bug.cgi?id=2299429 - Issue Tracking
Summary
  • (es) Se ha identificado una vulnerabilidad de omisión de autenticación en Foreman cuando se implementa con autenticación externa, debido a la configuración puppet-foreman. Este problema surge porque mod_proxy de Apache no anula los encabezados correctamente debido a las restricciones sobre los guiones bajos en los encabezados HTTP, lo que permite la autenticación a través de un encabezado mal formado. Esta falla afecta a todas las implementaciones de Satellite activas (6.13, 6.14 y 6.15) y podría permitir que usuarios no autorizados obtengan acceso administrativo.
CPE cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:*
First Time Redhat
Redhat satellite
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 9.8

04 Sep 2024, 17:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:6335 -
  • () https://access.redhat.com/errata/RHSA-2024:6336 -
  • () https://access.redhat.com/errata/RHSA-2024:6337 -

04 Sep 2024, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.1

04 Sep 2024, 15:15

Type Values Removed Values Added
Summary (en) An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access. (en) An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.

04 Sep 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 14:15

Updated : 2024-11-06 09:15


NVD link : CVE-2024-7012

Mitre link : CVE-2024-7012

CVE.ORG link : CVE-2024-7012


JSON object : View

Products Affected

redhat

  • satellite
CWE
CWE-287

Improper Authentication