VYPR
Moderate severityNVD Advisory· Published Dec 13, 2018· Updated Aug 5, 2024

CVE-2018-14623

CVE-2018-14623

Description

A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An authenticated SQL injection in Katello's errata API allows attackers to leak internal database identifiers; fixed in Satellite 6.3.

Vulnerability

A SQL injection flaw exists in Katello's errata-related API. The vulnerability allows an authenticated remote attacker to craft input data that, when processed by the errata API, forces the generation of a malformed SQL query to the backend database. This issue is an incomplete fix for CVE-2016-3072. Katello version 3.10 and older are vulnerable [1][2][3].

Exploitation

An attacker must have valid authentication to the Katello/Satellite system. By sending a specially crafted request to the errata-related API endpoint, the attacker can inject SQL commands that are executed by the backend database. No user interaction beyond initial authentication is required; the attacker directly manipulates the API input [1][2][3].

Impact

Successful exploitation results in leakage of internal database identifiers. The primary impact is confidentiality loss of internal IDs, which could aid further attacks. The attacker does not gain the ability to modify or delete data, nor achieve remote code execution directly from this vulnerability [1][2][3].

Mitigation

The vulnerability is addressed in Red Hat Satellite 6.3, released as part of RHSA-2018:0336. Users are advised to upgrade to Satellite 6.3 or apply the relevant security update to their Katello packages. For Satellite versions prior to 6.3, no workarounds have been published by Red Hat [1][2].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
katelloRubyGems
<= 3.10

Affected products

2
  • ghsa-coords
    Range: <= 3.10
  • The Foreman Project/katellov5
    Range: 3.10 and older

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.