VYPR

by Theforeman

Source repositories

CVEs (9)

CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2012-3503Cri0.579.80.01Aug 25, 2012The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.
CVE-2013-21430.080.61Apr 17, 2014The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.
CVE-2014-01830.000.00Jan 2, 2020Versions of Katello as shipped with Red Hat Subscription Asset Manager 1.4 are vulnerable to a XSS via HTML in the systems name when registering.
CVE-2013-41200.000.01Dec 10, 2019Katello has a Denial of Service vulnerability in API OAuth authentication
CVE-2013-02830.000.00Dec 5, 2019Katello: Username in Notification page has cross site scripting
CVE-2013-21010.000.00Dec 3, 2019Katello has multiple XSS issues in various entities
CVE-2014-37120.000.01Nov 3, 2014Katello allows remote attackers to cause a denial of service (memory consumption) via the (1) mode parameter in the setup_utils function in content_search_controller.rb or (2) action parameter in the respond function in api/api_controller.rb in app/controllers/katello/, which is passed to the to_sym method.
CVE-2012-61160.000.00Mar 1, 2013modules/certs/manifests/config.pp in katello-configure before 1.3.3.pulpv2 in Katello uses weak permissions (666) for the Candlepin bootstrap RPM, which allows local users to modify the Candlepin CA certificate by writing to this file.
CVE-2012-55610.000.00Mar 1, 2013script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.