Search
Total
9 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2018-10863 | 1 Redhat | 1 Certification | 2021-06-04 | 5.0 MEDIUM | 7.5 HIGH |
| It has been discovered that redhat-certification is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather sensible information. This flaw affects redhat-certification version 7. | |||||
| CVE-2018-10866 | 1 Redhat | 1 Certification | 2021-06-04 | 6.4 MEDIUM | 9.1 CRITICAL |
| It has been discovered that redhat-certification does not perform an authorization check and it allows an unauthenticated user to remove a "system" file, that is an xml file with host related information, not belonging to him. This flaw affects redhat-certification version 7. | |||||
| CVE-2018-10865 | 1 Redhat | 1 Certification | 2021-06-04 | 5.0 MEDIUM | 7.5 HIGH |
| It has been discovered that redhat-certification does not perform an authorization check and allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system. An attacker could use this flaw to send requests to port 8009 of any host or to keep restarting the RHCertD daemon on a host of another customer. This flaw affects redhat-certification version 7. | |||||
| CVE-2018-10867 | 1 Redhat | 1 Certification | 2021-06-04 | 6.4 MEDIUM | 9.1 CRITICAL |
| It has been discovered that redhat-certification does not restrict file access in the /update/results page. A remote attacker could use this vulnerability to remove any file accessible by the user which is running httpd. This flaw affects redhat-certification version 7. | |||||
| CVE-2018-10868 | 1 Redhat | 1 Certification | 2021-06-04 | 5.0 MEDIUM | 7.5 HIGH |
| It has been discovered that redhat-certification does not properly limit the number of recursive definitions of entities in XML documents while parsing the status of a host. A remote attacker could use this vulnerability to consume all the memory of the server and cause a Denial of Service. This flaw affects redhat-certification version 7. | |||||
| CVE-2019-3897 | 1 Redhat | 2 Certification, Enterprise Linux | 2021-03-22 | 5.0 MEDIUM | 5.3 MEDIUM |
| It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue. | |||||
| CVE-2018-10870 | 1 Redhat | 2 Certification, Enterprise Linux | 2019-10-09 | 7.5 HIGH | 9.8 CRITICAL |
| redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution. | |||||
| CVE-2018-10869 | 1 Redhat | 2 Certification, Enterprise Linux | 2019-10-09 | 5.0 MEDIUM | 7.5 HIGH |
| redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd. | |||||
| CVE-2018-10864 | 1 Redhat | 2 Certification, Linux | 2019-10-09 | 5.0 MEDIUM | 6.2 MEDIUM |
| An uncontrolled resource consumption flaw has been discovered in redhat-certification in the way documents are loaded. A remote attacker may provide an existing but invalid XML file which would be opened and never closed, possibly producing a Denial of Service. | |||||
