14 results (0.015 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 1

The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only. La colección remota para pulp_ansible almacena tokens en texto plano en lugar de usar el campo encriptado de pulp y los expone en modo de lectura/escritura por medio de la API () en lugar de marcarla como sólo de escritura A flaw exists in the collection remote for pulp_ansible, where tokens are stored in plaintext instead of using pulp's encrypted field. This flaw allows an attacker with sufficient privileges to read the stored tokens, resulting in the loss of confidentiality. • https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234 https://access.redhat.com/security/cve/CVE-2022-3644 https://bugzilla.redhat.com/show_bug.cgi?id=2131990 • CWE-256: Plaintext Storage of a Password CWE-522: Insufficiently Protected Credentials •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

pulp 2.16.x and possibly older is vulnerable to an improper path parsing. A malicious user or a malicious iso feed repository can write to locations accessible to the 'apache' user. This may lead to overwrite of published content on other iso repositories. pulp en versiones 2.16.x y, posiblemente, anteriores, es vulnerable a un análisis de ruta incorrecto. Un usuario malicioso o un repositorio de feeds de ISO malicioso puede escribir en ubicaciones accesibles al usuario "apache". Esto podría conducir a la sobrescritura de contenido publicado en otros repositorios iso. • https://access.redhat.com/errata/RHSA-2019:1222 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10917 https://access.redhat.com/security/cve/CVE-2018-10917 https://bugzilla.redhat.com/show_bug.cgi?id=1598928 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

In Pulp before version 2.16.2, secrets are passed into override_config when triggering a task and then become readable to all users with read access on the distributor/importer. An attacker with API access can then view these secrets. En Pulp en versiones anteriores a la 2.16.2, los secretos se pasan a override_config al desencadenar una tarea y después se vuelven legibles para todos los usuarios con acceso de lectura al distribuidor/importador. Un atacante con acceso a la API puede visualizar estos secretos. In pulp, secrets are passed into override_config when triggering a task and then become readable to all users with read access on the distributor/importer. • https://access.redhat.com/errata/RHSA-2018:2927 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1090 https://pulp.plan.io/issues/3521 https://access.redhat.com/security/cve/CVE-2018-1090 https://bugzilla.redhat.com/show_bug.cgi?id=1560035 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

The Qpid server on Red Hat Satellite 6 does not properly restrict message types, which allows remote authenticated users with administrative access on a managed content host to execute arbitrary code via a crafted message, related to a pickle processing problem in pulp. El servidor Qpid en Red Hat Satellite 6 no restringe correctamente los tipos de mensaje, lo que permite que usuarios autenticados remotos con acceso administrativo en un host de contenidos gestionado para ejecutar código arbitrario mediante un mensaje manipulado, relacionado con un problema de procesado pickle en pulp. • https://bugzilla.redhat.com/show_bug.cgi?id=1247732 https://pulp.plan.io/issues/23 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.1EPSS: 0%CPEs: 13EXPL: 0

pulp-consumer-client 2.4.0 through 2.6.3 does not check the server's TLS certificate signatures when retrieving the server's public key upon registration. pulp-consumer-client desde la versión 2.4.0 hasta la 2.6.3 no verifica las firmas del certificado TLS del servidor cuando recupera la clave pública de este al registrarse. • http://cve.killedkenny.io/cve/CVE-2015-5263 http://www.openwall.com/lists/oss-security/2015/09/24/4 https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/client_consumer/pulp/client/consumer/cli.py#L103 https://github.com/pulp/pulp/commit/b542d7465f7e6e02e1ea1aec059ac607a65cefe7#diff-17110211f89c042a9267e2167dedd754 • CWE-295: Improper Certificate Validation •