{"vulnerability": "CVE-2024-7923", "sightings": [{"uuid": "52fcc099-e6e4-4c42-8116-b62026174e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-7923", "type": "seen", "source": "https://social.circl.lu/users/circl/statuses/113539605118463283", "content": "", "creation_timestamp": "2024-11-24T19:34:45.026164Z"}, {"uuid": "823d0b97-b377-446b-bc00-34b305d50585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/cvedetector/4790", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7923 - Foreman Apache Mod_Proxy Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7923 \nPublished : Sept. 4, 2024, 2:15 p.m. | 29\u00a0minutes ago \nDescription : An authentication bypass vulnerability has been identified in Foreman when deployed with Gunicorn versions prior to 22.0, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 4.0+ and could potentially enable unauthorized users to gain administrative access. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T16:54:35.000000Z"}, {"uuid": "ec49646c-4e8a-436a-b696-db2b35d34eff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18576", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-7923\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.\n\ud83d\udccf Published: 2024-09-04T13:41:48.872Z\n\ud83d\udccf Modified: 2025-06-17T08:38:14.465Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:6335\n2. https://access.redhat.com/errata/RHSA-2024:6336\n3. https://access.redhat.com/errata/RHSA-2024:6337\n4. https://access.redhat.com/errata/RHSA-2024:8906\n5. https://access.redhat.com/security/cve/CVE-2024-7923\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2305718", "creation_timestamp": "2025-06-17T09:41:32.000000Z"}, {"uuid": "b29eaed7-d370-4082-ba67-20d622236268", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/hackyourmom/9032", "content": "\ud83d\udcde Red Hat \u0432\u0438\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0442\u0435\u0440\u043c\u0456\u043d\u043e\u0432\u0438\u0439 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u0432\u0438\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0457 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 (CVE-2024-7923) \u0443 Pulpcore, \u044f\u043a\u0430 \u043c\u043e\u0436\u0435 \u043f\u0440\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u0434\u043e \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u043d\u044f \u0430\u0434\u043c\u0456\u043d\u0456\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0442\u0430 \u043f\u043e\u0440\u0443\u0448\u0435\u043d\u043d\u044f \u0440\u043e\u0431\u043e\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c \ud83d\ude22#cybernews", "creation_timestamp": "2024-09-09T13:20:28.000000Z"}, {"uuid": "ed6efea7-c893-4d39-a454-3b348559ccaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/HackingInsights/12499", "content": "\u200aRed Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923)\n\nhttps://securityonline.info/red-hat-issues-critical-patch-for-pulpcore-authentication-bypass-flaw-cve-2024-7923/", "creation_timestamp": "2024-09-08T17:48:04.000000Z"}, {"uuid": "dfe080e7-41fc-480c-9d00-9a94fa672b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/GrayHatsHack/8716", "content": "\u26a1\ufe0fRed Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923).\n\n#CyberBulletin", "creation_timestamp": "2024-09-07T06:38:03.000000Z"}, {"uuid": "b29b3245-a4e9-4fea-9151-d90159eb8582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/CyberBulletin/576", "content": "\u26a1\ufe0fRed Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923).\n\n#CyberBulletin", "creation_timestamp": "2024-09-07T06:19:56.000000Z"}, {"uuid": "1011c79f-ccb6-441c-9e28-d81cf08a717d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/InfoSecInsider/23696", "content": "\u26a1\ufe0fRed Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923).\n\n#CyberBulletin", "creation_timestamp": "2024-09-07T06:38:17.000000Z"}, {"uuid": "b26ea991-dafd-4090-95c6-5ef0b6d9c199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/GrayHatsHack/7384", "content": "\u26a1\ufe0fRed Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923).\n\n#CyberBulletin", "creation_timestamp": "2024-09-07T06:38:03.000000Z"}, {"uuid": "699e61b5-21ed-4ee2-b867-d23b79082ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7923", "type": "seen", "source": "https://t.me/InfoSecInsider/217", "content": "\u26a1\ufe0fRed Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923).\n\n#CyberBulletin", "creation_timestamp": "2024-09-07T06:38:19.000000Z"}]}