
CVE-2013-4120
https://notcve.org/view.php?id=CVE-2013-4120
10 Dec 2019 — Katello has a Denial of Service vulnerability in API OAuth authentication Katello tiene una vulnerabilidad de denegación de servicio en la autenticación de la API OAuth. • https://access.redhat.com/security/cve/cve-2013-4120 • CWE-400: Uncontrolled Resource Consumption •

CVE-2013-0283
https://notcve.org/view.php?id=CVE-2013-0283
05 Dec 2019 — Katello: Username in Notification page has cross site scripting Katello: El nombre de usuario en la página Notification presenta una vulnerabilidad de tipo cross site scripting. • https://access.redhat.com/security/cve/cve-2013-0283 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2013-2101
https://notcve.org/view.php?id=CVE-2013-2101
03 Dec 2019 — Katello has multiple XSS issues in various entities Katello presenta múltiples problemas de tipo XSS en varias entidades. • https://access.redhat.com/security/cve/cve-2013-2101 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-14825 – katello: registry credentials are captured in plain text during repository discovery
https://notcve.org/view.php?id=CVE-2019-14825
22 Oct 2019 — A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. Se detectó un problema de almacenamiento de contraseña en texto sin cifrar en Katello, versiones 3.x.x.x anteriores a katello 3.12.0.9. Las credenciales de registro utilizadas durante la detección de imágenes del contenedor se... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14825 • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2018-16887 – katello: stored XSS in subscriptions and repositories pages
https://notcve.org/view.php?id=CVE-2018-16887
13 Jan 2019 — A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable. Se ha encontrado un error de Cross-Site Scripting (XSS) en el componente "katello" de Sa... • https://access.redhat.com/errata/RHSA-2019:1222 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2018-14623 – katello: SQL inject in errata-related REST API
https://notcve.org/view.php?id=CVE-2018-14623
13 Dec 2018 — A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable. Se ha encontrado un error de inyección SQL en la API relacionada con erratas de katello. • http://www.securityfocus.com/bid/106224 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2017-2662 – foreman: Managing repositories with their id via hammer does not respect the role filters
https://notcve.org/view.php?id=CVE-2017-2662
22 Aug 2018 — A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id. Se ha detectado un fallo en la versión 3.4.5 del plugin katello de Foreman. Después de establecer un nuevo rol para permitir el acceso restringido a un repositorio con un filtro (filtro establecido en el nombre del producto), el filtro no se resp... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2662 • CWE-269: Improper Privilege Management CWE-862: Missing Authorization •

CVE-2016-9595 – katello-debug: Possible symlink attacks due to use of predictable file names
https://notcve.org/view.php?id=CVE-2016-9595
20 Feb 2018 — A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files. Se ha encontrado un fallo en katello-debug en versiones anteriores a la 3.4.0, donde determinados scripts y archivos de log utilizaban archivos temporales no seguros. Un usuario local podría explotar esta vulnerabilidad para llevar a cabo un ataque de enlace simbóli... • https://access.redhat.com/errata/RHSA-2018:0336 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •

CVE-2013-2143 – Katello (RedHat Satellite) - users/update_roles Missing Authorisation
https://notcve.org/view.php?id=CVE-2013-2143
25 Mar 2014 — The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account. El controlador de usuarios en Katello 1.5.0-14 y anteriores, y Red Hat Satellite, no comprueba autorización para la acción update_roles, lo que permite a usuarios remotos autenticados ganar privilegios mediante la configuración de una cuenta de usuario hacia una ... • https://packetstorm.news/files/id/125866 • CWE-20: Improper Input Validation CWE-862: Missing Authorization •

CVE-2012-3503 – Katello: Application.config.secret_token is not generated properly
https://notcve.org/view.php?id=CVE-2012-3503
25 Aug 2012 — The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token. El script de instalación en Katello 1.0 y anteriores no genera correctamente el valor Application.config.secret_token, lo que hace que cada instalación por d... • http://rhn.redhat.com/errata/RHSA-2012-1186.html • CWE-798: Use of Hard-coded Credentials •