Files
CVEs-PoC/2021/CVE-2021-4142.md
T
2024-05-25 21:48:12 +02:00

18 lines
874 B
Markdown

### [CVE-2021-4142](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4142)
![](https://img.shields.io/static/v1?label=Product&message=candlepin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Affects%20v3.1.28-2%2C%20v3.2.21-1%2C%20v4.1.8-1%20and%20earlier%20are%20affected.%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20-%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20-%3E%20CWE-287%20-%20Improper%20Authentication&color=brighgreen)
### Description
The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon