Vulnerability Details : CVE-2019-3845
A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.
Vulnerability category: BypassGain privilege
Products affected by CVE-2019-3845
- cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-3845
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-3845
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.2
|
MEDIUM | AV:A/AC:L/Au:S/C:P/I:P/A:P |
5.1
|
6.4
|
NIST | |
8.0
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
Red Hat, Inc. | |
8.0
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
NIST |
CWE ids for CVE-2019-3845
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2019-3845
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3845
1684275 – (CVE-2019-3845) CVE-2019-3845 qpid-dispatch-router: QMF methods exposed to goferd via qdrouterdIssue Tracking;Mitigation;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:1223
RHSA-2019:1223 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to