A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to trigger an external interaction to an attacker's server by modifying the Referer header in an HTTP request of specific resources in the server.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2145254 | Issue Tracking Permissions Required Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2145254 | Issue Tracking Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2145254 - Issue Tracking, Permissions Required, Vendor Advisory |
Information
Published : 2022-12-16 16:15
Updated : 2025-04-14 19:15
NVD link : CVE-2022-4130
Mitre link : CVE-2022-4130
JSON object : View
Products Affected
redhat
- satellite
CWE