CVE-2021-4142
Satellite: Allow unintended SCA certificate to authenticate Candlepin
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin.
El componente Candlepin de Red Hat Satellite estaba afectado por un fallo de autenticación inapropiado. Algunos factores podían permitir a un atacante usar el certificado SCA (Simple Content Access) para la autenticación con Candlepin.
Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include HTTP request smuggling, buffer overflow, bypass, code execution, cross site scripting, denial of service, heap overflow, information leakage, privilege escalation, remote shell upload, remote SQL injection, and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-20 CVE Reserved
- 2022-03-09 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/candlepin/candlepin/pull/3198 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/candlepin/candlepin/pull/3197 | 2023-11-07 | |
https://github.com/candlepin/candlepin/pull/3199 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-4142 | 2022-07-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2034346 | 2022-07-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Candlepinproject Search vendor "Candlepinproject" | Candlepin Search vendor "Candlepinproject" for product "Candlepin" | >= 3.1.0 <= 3.1.28-2 Search vendor "Candlepinproject" for product "Candlepin" and version " >= 3.1.0 <= 3.1.28-2" | - |
Affected
| ||||||
Candlepinproject Search vendor "Candlepinproject" | Candlepin Search vendor "Candlepinproject" for product "Candlepin" | >= 3.2.0 <= 3.2.21-1 Search vendor "Candlepinproject" for product "Candlepin" and version " >= 3.2.0 <= 3.2.21-1" | - |
Affected
| ||||||
Candlepinproject Search vendor "Candlepinproject" | Candlepin Search vendor "Candlepinproject" for product "Candlepin" | >= 4.1.0 <= 4.1.8-1 Search vendor "Candlepinproject" for product "Candlepin" and version " >= 4.1.0 <= 4.1.8-1" | - |
Affected
|