cpe:2.3:a:redhat:satellite:5.3:*:*:*:*:*:*:*
An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity.
Max CVSS
7.6
EPSS Score
0.05%
Published
2023-12-18
Updated
2024-01-03
A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.
Max CVSS
8.0
EPSS Score
0.04%
Published
2019-04-11
Updated
2020-10-15
Red Hat Satellite before 6.5 is vulnerable to a XSS in discovery rule when you are entering filter and you use autocomplete functionality.
Max CVSS
5.4
EPSS Score
0.16%
Published
2018-07-26
Updated
2023-02-12
A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users.
Max CVSS
5.4
EPSS Score
0.07%
Published
2018-07-26
Updated
2019-10-09
A cross-site scripting (XSS) flaw was found in how the failed action entry is processed in Red Hat Satellite before version 5.8.0. A user able to specify a failed action could exploit this flaw to perform XSS attacks against other Satellite users.
Max CVSS
5.4
EPSS Score
0.05%
Published
2018-07-30
Updated
2023-02-12
It was found that Satellite 5 configured with SSL/TLS for the PostgreSQL backend failed to correctly validate X.509 server certificate host name fields. A man-in-the-middle attacker could use this flaw to spoof a PostgreSQL server using a specially crafted X.509 certificate.
Max CVSS
5.8
EPSS Score
0.07%
Published
2018-08-22
Updated
2019-10-09
Red Hat Satellite 5.6 and earlier does not disable the web interface that is used to create the first user for a satellite, which allows remote attackers to create administrator accounts.
Max CVSS
7.5
EPSS Score
0.71%
Published
2013-11-18
Updated
2023-02-13
The Inter-Satellite Sync (ISS) operation in Red Hat Network (RHN) Satellite 5.3, 5.4, and 5.5 does not properly check client "authenticity," which allows remote attackers to obtain channel content by skipping the initial authentication call.
Max CVSS
5.0
EPSS Score
0.31%
Published
2013-07-31
Updated
2022-02-03
rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
Max CVSS
6.5
EPSS Score
0.10%
Published
2019-12-02
Updated
2019-12-13
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, related to backticks.
Max CVSS
6.0
EPSS Score
1.68%
Published
2014-04-15
Updated
2022-02-03
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
Max CVSS
5.5
EPSS Score
0.66%
Published
2011-04-18
Updated
2022-02-19
11 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!