Vulnerability identifier: #VU25420
Vulnerability risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-347
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Spacewalk
Client/Desktop applications /
Other client software
Vendor: Red Hat Inc.
Description
The vulnerability allows a remote attacker to bypass signature validation process.
The vulnerability exists due to the affected software does not safely compute client token checksums. A remote attacker with a valid, but expired, authenticated set of headers can move some digits around, artificially extending the session validity without modifying the checksum.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
Spacewalk: 0.5 - 2.9
External links
https://www.securityfocus.com/bid/109029
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10136
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.