Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Unknown
CVE-2021-40348
Disclosure Date: November 01, 2021 (last updated November 28, 2024)
Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.
0
Attacker Value
Unknown
CVE-2020-1693
Disclosure Date: February 17, 2020 (last updated February 21, 2025)
A flaw was found in Spacewalk up to version 2.9 where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.
0
Attacker Value
Unknown
CVE-2019-10136
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.
0
Attacker Value
Unknown
CVE-2019-10137
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
A path traversal flaw was found in spacewalk-proxy, all versions through 2.9, in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process.
0
Attacker Value
Unknown
CVE-2017-7470
Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.
0
Attacker Value
Unknown
CVE-2018-1077
Disclosure Date: March 14, 2018 (last updated November 26, 2024)
Spacewalk 2.6 contains an API which has an XXE flaw allowing for the disclosure of potentially sensitive information from the server.
0
Attacker Value
Unknown
CVE-2016-3079
Disclosure Date: April 14, 2016 (last updated November 25, 2024)
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Spacewalk and Red Hat Satellite 5.7 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to systems/SystemEntitlements.do; (2) the label parameter to admin/multiorg/EntitlementDetails.do; or the name of a (3) snapshot tag or (4) system group in System Set Manager (SSM).
0
Attacker Value
Unknown
CVE-2015-0284
Disclosure Date: April 14, 2016 (last updated November 08, 2023)
Cross-site scripting (XSS) vulnerability in spacewalk-java in Spacewalk and Red Hat Satellite 5.7 allows remote authenticated users to inject arbitrary web script or HTML via crafted XML data to the XMLRPC API, involving user details. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-7811.
0
Attacker Value
Unknown
CVE-2014-7811
Disclosure Date: January 15, 2015 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk and Red Hat Network (RHN) Satellite before 5.7.0 allow remote authenticated users to inject arbitrary web script or HTML via crafted XML data to the REST API.
0
Attacker Value
Unknown
CVE-2014-7812
Disclosure Date: January 15, 2015 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in Spacewalk and Red Hat Network (RHN) Satellite before 5.7.0 allows remote authenticated users to inject arbitrary web script or HTML via the System Groups field.
0