Lucene search

K

6 matches found

CVE
CVE
added 2021/03/16 10:15 p.m.52 views

CVE-2019-3897

It has been discovered in redhat-certification that any unauthorized user may download any file under /var/www/rhcert, provided they know its name. Red Hat Certification 6 and 7 is vulnerable to this issue.

5.3CVSS5.2AI score0.00179EPSS
CVE
CVE
added 2021/05/26 7:15 p.m.49 views

CVE-2018-10868

redhat-certification 7 does not properly restrict the number of recursive definitions of entities in XML documents, allowing an unauthenticated user to run a "Billion Laugh Attack" by replying to XMLRPC methods when getting the status of an host.

7.5CVSS7.5AI score0.0117EPSS
CVE
CVE
added 2021/05/26 7:15 p.m.48 views

CVE-2018-10863

It was discovered that redhat-certification 7 is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory, through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather sensible information.

7.5CVSS7.4AI score0.00235EPSS
CVE
CVE
added 2021/05/26 7:15 p.m.42 views

CVE-2018-10865

It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to call a "restart" RPC method on any host accessible by the system, even if not belonging to him.

7.5CVSS7.5AI score0.00977EPSS
CVE
CVE
added 2021/05/26 7:15 p.m.42 views

CVE-2018-10866

It was discovered that the /configuration view of redhat-certification 7 does not perform an authorization check and it allows an unauthenticated user to remove a "system" file, that is an xml file with host related information, not belonging to him.

9.1CVSS9.2AI score0.00925EPSS
CVE
CVE
added 2021/05/26 7:15 p.m.41 views

CVE-2018-10867

Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user.

9.1CVSS9.1AI score0.00341EPSS