How to remediate CVE-2024-7923 on Red Hat Satellite and Capsule

Solution Verified - Updated -

Issue

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.

Environment

Red Hat Satellite and Capsule 6.10
Red Hat Satellite and Capsule 6.11
Red Hat Satellite and Capsule 6.12
Red Hat Satellite and Capsule 6.13
Red Hat Satellite and Capsule 6.14
Red Hat Satellite and Capsule 6.15

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content