CVE-2024-7012

Severity
9.8CRITICAL
EPSS
0.2%
top 55.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4

Description

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDredhat/satellite6.13, 6.14, 6.15+2

🔴Vulnerability Details

2
CVEList
Puppet-foreman: an authentication bypass vulnerability exists in foreman2024-09-04
GHSA
GHSA-gp3v-m4q9-3v8h: An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configurat2024-09-04

📋Vendor Advisories

1
Red Hat
puppet-foreman: An authentication bypass vulnerability exists in Foreman2024-09-04