Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2024-7143 CVE-2024-37891 CVE-2024-24790 CVE-2024-24788 |
CWE-ID | CWE-277 CWE-200 CWE-20 CWE-835 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
python3x-urllib3 (Red Hat package) Operating systems & Components / Operating system package or component python3x-pulpcore (Red Hat package) Operating systems & Components / Operating system package or component python3x-django (Red Hat package) Operating systems & Components / Operating system package or component receptor (Red Hat package) Operating systems & Components / Operating system package or component python-urllib3 (Red Hat package) Operating systems & Components / Operating system package or component python-pulpcore (Red Hat package) Operating systems & Components / Operating system package or component python-django (Red Hat package) Operating systems & Components / Operating system package or component automation-controller (Red Hat package) Operating systems & Components / Operating system package or component Ansible Automation Platform Server applications / Other server solutions |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU97631
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-7143
CWE-ID:
CWE-277 - Insecure inherited permissions
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to the way permissions are assigned on new tasks with RBAC enabled. A remote user can use a specially crafted task that creates new objects. Such objects will be owned by the oldest user with model/domain-level task permissions within the application and executed with privileges of such a user.
Install updates from vendor's website.
python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap
python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap
python3x-django (Red Hat package): before 4.2.16-1.el8ap
receptor (Red Hat package): before 1.4.8-1.1.el8ap
python-urllib3 (Red Hat package): before 1.26.20-1.el9ap
python-pulpcore (Red Hat package): before 3.28.32-1.el9ap
python-django (Red Hat package): before 4.2.16-1.el9ap
automation-controller (Red Hat package): before 4.5.11-1.el8ap
Ansible Automation Platform: before 2.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:6765
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92262
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-37891
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to Prox-Authorization header is not stripped during cross-origin redirects when using urllib3's proxy support with ProxyManager. A remote attacker can gain obtain proxy credentials used by the library.
Install updates from vendor's website.
python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap
python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap
python3x-django (Red Hat package): before 4.2.16-1.el8ap
receptor (Red Hat package): before 1.4.8-1.1.el8ap
python-urllib3 (Red Hat package): before 1.26.20-1.el9ap
python-pulpcore (Red Hat package): before 3.28.32-1.el9ap
python-django (Red Hat package): before 4.2.16-1.el9ap
automation-controller (Red Hat package): before 4.5.11-1.el8ap
Ansible Automation Platform: before 2.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:6765
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91160
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-24790
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to modify application behavior.
The vulnerability exists due to improper handling of IPv4-mapped IPv6 addresses in net/netip within multiple methods, e.g. IsPrivate, IsLoopback. The affected methods return false for addresses which would return true in their traditional IPv4 forms, leading to potential bypass of implemented security features.
Install updates from vendor's website.
python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap
python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap
python3x-django (Red Hat package): before 4.2.16-1.el8ap
receptor (Red Hat package): before 1.4.8-1.1.el8ap
python-urllib3 (Red Hat package): before 1.26.20-1.el9ap
python-pulpcore (Red Hat package): before 3.28.32-1.el9ap
python-django (Red Hat package): before 4.2.16-1.el9ap
automation-controller (Red Hat package): before 4.5.11-1.el8ap
Ansible Automation Platform: before 2.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:6765
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89296
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-24788
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing DNS responses. A remote attacker can send a specially crafted DNS response to the application and cause denial of service conditions.
MitigationInstall updates from vendor's website.
python3x-urllib3 (Red Hat package): before 1.26.20-1.el8ap
python3x-pulpcore (Red Hat package): before 3.28.32-1.el8ap
python3x-django (Red Hat package): before 4.2.16-1.el8ap
receptor (Red Hat package): before 1.4.8-1.1.el8ap
python-urllib3 (Red Hat package): before 1.26.20-1.el9ap
python-pulpcore (Red Hat package): before 3.28.32-1.el9ap
python-django (Red Hat package): before 4.2.16-1.el9ap
automation-controller (Red Hat package): before 4.5.11-1.el8ap
Ansible Automation Platform: before 2.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:6765
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.