Pulpcore: rbac permissions incorrectly assigned in tasks that create objects
Description
A flaw was found in the Pulp package. When a role-based access control (RBAC) object in Pulp is set to assign permissions on its creation, it uses the AutoAddObjPermsMixin (typically the add_roles_for_object_creator method). This method finds the object creator by checking the current authenticated user. For objects that are created within a task, this current user is set by the first user with any permissions on the task object. This means the oldest user with model/domain-level task permissions will always be set as the current user of a task, even if they didn't dispatch the task. Therefore, all objects created in tasks will have their permissions assigned to this oldest user, and the creating user will receive nothing.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Pulp RBAC flaw causes permissions on objects created in tasks to be assigned to the task's oldest user with permissions, not the actual creator.
Vulnerability
Description A flaw in the Pulp package's role-based access control (RBAC) implementation causes incorrect assignment of object permissions during task execution. The AutoAddObjPermsMixin mixin, specifically the add_roles_for_object_creator method, determines the object creator by checking the current authenticated user context. However, for objects created within a task, this context is set to the first user who has any permissions on the task object, which is typically the oldest user with model/domain-level task permissions, rather than the user who actually dispatched the task. [1][2]
Exploitation
An attacker who is an older user with task permissions within the Pulp system can exploit this by having their permissions context carry over to tasks they did not initiate. As a result, any objects created in those tasks will have their permissions granted to the oldest user with task permissions, not the user who triggered the task. This attack requires that the attacker already has some model/domain-level task permissions, but they do not need to have dispatched the task themselves. [3]
Impact
Successful exploitation leads to privilege escalation where an attacker granted permissions to objects they did not create. The legitimate creating user receives no permissions on the objects they created, potentially locking them out of their own work. This undermines the RBAC model and can lead to unauthorized access or denial of service for legitimate users. [4]
Mitigation
Red Hat has released an advisory (RHSA-2024:6765) with patches to address this vulnerability. Users should update their Pulp installations to the latest version that corrects the permission assignment logic. No workarounds have been publicly documented. The vulnerability affects Pulp packages; checking the advisory for specific version fixes is recommended. [1]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pulpcorePyPI | <= 3.56.0 | — |
Affected products
13- osv-coords11 versionspkg:apk/chainguard/py3.10-pulppkg:apk/chainguard/py3.10-pulp-binpkg:apk/chainguard/py3.11-pulppkg:apk/chainguard/py3.11-pulp-binpkg:apk/chainguard/py3.12-pulppkg:apk/chainguard/py3.12-pulp-binpkg:apk/chainguard/py3.13-pulppkg:apk/chainguard/py3.13-pulp-binpkg:apk/chainguard/py3-pulppkg:apk/chainguard/py3-supported-pulppkg:pypi/pulpcore
< 0+ 10 more
- (no CPE)range: < 0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: < 3.3.0-r0
- (no CPE)range: <= 3.56.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- access.redhat.com/errata/RHSA-2024:6765ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-9m5j-4xx9-44j9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-7143ghsaADVISORY
- access.redhat.com/security/cve/CVE-2024-7143ghsavdb-entryx_refsource_REDHATWEB
- bugzilla.redhat.com/show_bug.cgighsaissue-trackingx_refsource_REDHATWEB
- github.com/pulp/pulpcore/blob/93f241f34c503da0fbac94bdba739feda2636e12/pulpcore/tasking/_util.pyghsaWEB
- github.com/pulp/pulpcore/blob/main/CHANGES.mdghsaWEB
News mentions
0No linked articles in our index yet.