Vulnerabilities (CVE)

Filtered by vendor Katello Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-3712 1 Katello 1 Katello 2017-09-02 5.0 MEDIUM N/A
Katello allows remote attackers to cause a denial of service (memory consumption) via the (1) mode parameter in the setup_utils function in content_search_controller.rb or (2) action parameter in the respond function in api/api_controller.rb in app/controllers/katello/, which is passed to the to_sym method.
CVE-2013-4455 1 Katello 1 Katello Installer 2014-05-15 2.1 LOW N/A
Katello Installer before 0.0.18 uses world-readable permissions for /etc/pki/tls/private/katello-node.key when deploying a child Pulp node, which allows local users to obtain the private key by reading the file.
CVE-2013-2143 2 Katello, Redhat 2 Katello, Network Satellite 2014-04-17 6.5 MEDIUM N/A
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.
CVE-2012-6116 1 Katello 2 Katello, Katello-configure 2013-04-04 2.1 LOW N/A
modules/certs/manifests/config.pp in katello-configure before 1.3.3.pulpv2 in Katello uses weak permissions (666) for the Candlepin bootstrap RPM, which allows local users to modify the Candlepin CA certificate by writing to this file.
CVE-2012-3503 1 Katello 1 Katello 2013-03-22 6.5 MEDIUM N/A
The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.
CVE-2012-5561 1 Katello 1 Katello 2013-03-01 2.1 LOW N/A
script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.