Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2024-1135 CVE-2024-24790 CVE-2024-26130 CVE-2024-41991 |
CWE-ID | CWE-444 CWE-20 CWE-476 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
yggdrasil-worker-forwarder (Red Hat package) Operating systems & Components / Operating system package or component satellite (Red Hat package) Operating systems & Components / Operating system package or component rubygem-katello (Red Hat package) Operating systems & Components / Operating system package or component rubygem-hammer_cli_foreman_tasks (Red Hat package) Operating systems & Components / Operating system package or component rubygem-foreman_theme_satellite (Red Hat package) Operating systems & Components / Operating system package or component rubygem-foreman_rh_cloud (Red Hat package) Operating systems & Components / Operating system package or component python-pyOpenSSL (Red Hat package) Operating systems & Components / Operating system package or component python-pulpcore (Red Hat package) Operating systems & Components / Operating system package or component python-pulp-certguard (Red Hat package) Operating systems & Components / Operating system package or component python-gunicorn (Red Hat package) Operating systems & Components / Operating system package or component python-django (Red Hat package) Operating systems & Components / Operating system package or component python-cryptography (Red Hat package) Operating systems & Components / Operating system package or component foreman-installer (Red Hat package) Operating systems & Components / Operating system package or component foreman (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Satellite Server applications / Other server solutions |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU89167
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-1135
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests when handling Transfer-Encoding headers. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
MitigationInstall updates from vendor's website.
yggdrasil-worker-forwarder (Red Hat package): before 0.0.3-2.el8sat
satellite (Red Hat package): before 6.15.4-2.el8sat
rubygem-katello (Red Hat package): before 4.11.0.17-1.el8sat
rubygem-hammer_cli_foreman_tasks (Red Hat package): before 0.0.21-1.el8sat
rubygem-foreman_theme_satellite (Red Hat package): before 13.3.0-0.1.el8sat
rubygem-foreman_rh_cloud (Red Hat package): before 9.0.58-1.el8sat
python-pyOpenSSL (Red Hat package): before 24.1.0-1.el8pc
python-pulpcore (Red Hat package): before 3.39.21-1.el8pc
python-pulp-certguard (Red Hat package): before 1.7.2-1.el8pc
python-gunicorn (Red Hat package): before 22.0.0-1.el8pc
python-django (Red Hat package): before 4.2.15-1.el8pc
python-cryptography (Red Hat package): before 42.0.8-1.el8pc
foreman-installer (Red Hat package): before 3.9.3.5-1.el8sat
foreman (Red Hat package): before 3.9.1.10-1.el8sat
Red Hat Satellite: before 6.15.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:7987
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91160
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-24790
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to modify application behavior.
The vulnerability exists due to improper handling of IPv4-mapped IPv6 addresses in net/netip within multiple methods, e.g. IsPrivate, IsLoopback. The affected methods return false for addresses which would return true in their traditional IPv4 forms, leading to potential bypass of implemented security features.
Install updates from vendor's website.
yggdrasil-worker-forwarder (Red Hat package): before 0.0.3-2.el8sat
satellite (Red Hat package): before 6.15.4-2.el8sat
rubygem-katello (Red Hat package): before 4.11.0.17-1.el8sat
rubygem-hammer_cli_foreman_tasks (Red Hat package): before 0.0.21-1.el8sat
rubygem-foreman_theme_satellite (Red Hat package): before 13.3.0-0.1.el8sat
rubygem-foreman_rh_cloud (Red Hat package): before 9.0.58-1.el8sat
python-pyOpenSSL (Red Hat package): before 24.1.0-1.el8pc
python-pulpcore (Red Hat package): before 3.39.21-1.el8pc
python-pulp-certguard (Red Hat package): before 1.7.2-1.el8pc
python-gunicorn (Red Hat package): before 22.0.0-1.el8pc
python-django (Red Hat package): before 4.2.15-1.el8pc
python-cryptography (Red Hat package): before 42.0.8-1.el8pc
foreman-installer (Red Hat package): before 3.9.3.5-1.el8sat
foreman (Red Hat package): before 3.9.1.10-1.el8sat
Red Hat Satellite: before 6.15.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:7987
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87129
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26130
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
yggdrasil-worker-forwarder (Red Hat package): before 0.0.3-2.el8sat
satellite (Red Hat package): before 6.15.4-2.el8sat
rubygem-katello (Red Hat package): before 4.11.0.17-1.el8sat
rubygem-hammer_cli_foreman_tasks (Red Hat package): before 0.0.21-1.el8sat
rubygem-foreman_theme_satellite (Red Hat package): before 13.3.0-0.1.el8sat
rubygem-foreman_rh_cloud (Red Hat package): before 9.0.58-1.el8sat
python-pyOpenSSL (Red Hat package): before 24.1.0-1.el8pc
python-pulpcore (Red Hat package): before 3.39.21-1.el8pc
python-pulp-certguard (Red Hat package): before 1.7.2-1.el8pc
python-gunicorn (Red Hat package): before 22.0.0-1.el8pc
python-django (Red Hat package): before 4.2.15-1.el8pc
python-cryptography (Red Hat package): before 42.0.8-1.el8pc
foreman-installer (Red Hat package): before 3.9.3.5-1.el8sat
foreman (Red Hat package): before 3.9.1.10-1.el8sat
Red Hat Satellite: before 6.15.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:7987
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95444
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-41991
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in django.utils.html.urlize() and AdminURLFieldWidget. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
yggdrasil-worker-forwarder (Red Hat package): before 0.0.3-2.el8sat
satellite (Red Hat package): before 6.15.4-2.el8sat
rubygem-katello (Red Hat package): before 4.11.0.17-1.el8sat
rubygem-hammer_cli_foreman_tasks (Red Hat package): before 0.0.21-1.el8sat
rubygem-foreman_theme_satellite (Red Hat package): before 13.3.0-0.1.el8sat
rubygem-foreman_rh_cloud (Red Hat package): before 9.0.58-1.el8sat
python-pyOpenSSL (Red Hat package): before 24.1.0-1.el8pc
python-pulpcore (Red Hat package): before 3.39.21-1.el8pc
python-pulp-certguard (Red Hat package): before 1.7.2-1.el8pc
python-gunicorn (Red Hat package): before 22.0.0-1.el8pc
python-django (Red Hat package): before 4.2.15-1.el8pc
python-cryptography (Red Hat package): before 42.0.8-1.el8pc
foreman-installer (Red Hat package): before 3.9.3.5-1.el8sat
foreman (Red Hat package): before 3.9.1.10-1.el8sat
Red Hat Satellite: before 6.15.4
CPE2.3https://access.redhat.com/errata/RHSA-2024:7987
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.