CVE-2019-10137

Related Vulnerabilities: CVE-2019-10137  

Impact: Important Public Date: 2019-07-01 CWE: CWE-22 Bugzilla: 1702604: CVE-2019-10137 spacewalk-proxy: Path traversal in proxy authentication cache A path traversal flaw was found in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process.

A path traversal flaw was found in the way the proxy processes cached client tokens. A remote, unauthenticated attacker could use this flaw to test the existence of arbitrary files, if they have access to the proxy's filesystem, or can execute arbitrary code in the context of the httpd process.

Find out more about CVE-2019-10137 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 8.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Affected Packages State

Platform Package State
Red Hat Satellite 5 spacewalk-proxy Affected

Acknowledgements

Red Hat would like to thank Malte Kraus (SUSE) for reporting this issue.

Mitigation

SELinux in enforcing mode will prevent the proxy to access files that have an incompatible SELinux context