Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/44150 - Not Applicable | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0434.html - Not Applicable | |
References | () http://www.securityfocus.com/bid/47316 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1025316 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2011/0967 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=584118 - Issue Tracking, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66690 - Third Party Advisory, VDB Entry |
Information
Published : 2011-04-18 17:55
Updated : 2025-04-11 00:51
NVD link : CVE-2010-1171
Mitre link : CVE-2010-1171
CVE.ORG link : CVE-2010-1171
JSON object : View
Products Affected
redhat
- satellite
CWE
CWE-264
Permissions, Privileges, and Access Controls