CVE-2024-7012

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:satellite:6.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-04 14:15

Updated : 2024-11-06 09:15


NVD link : CVE-2024-7012

Mitre link : CVE-2024-7012

CVE.ORG link : CVE-2024-7012


JSON object : View

Products Affected

redhat

  • satellite
CWE
CWE-287

Improper Authentication