Auth Bypass in Pulpcore v3.0+ via Gunicorn <=22.0 + mod_proxy
CVE-2024-7923 Published on September 4, 2024

Puppet-pulpcore: an authentication bypass vulnerability exists in pulpcore
An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Timeline

Reported to Red Hat.

Made public. 16 days later.

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2024-7923 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2024-7923

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-7923 are published in these products:

 
 
 
 
 

Exploit Probability

EPSS
0.31%
Percentile
53.40%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.