It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/109029 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10136 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Feb 2023, 23:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum. |
02 Feb 2023, 16:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | It was found that Spacewalk did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum. |
Information
Published : 2019-07-02 20:15
Updated : 2023-12-10 12:59
NVD link : CVE-2019-10136
Mitre link : CVE-2019-10136
CVE.ORG link : CVE-2019-10136
JSON object : View
Products Affected
redhat
- satellite
- spacewalk
CWE
CWE-347
Improper Verification of Cryptographic Signature