katello 3.4.5

4 security vulnerabilities found in version 3.4.5

katello Cross-site Scripting vulnerability

medium severity CVE-2018-16887
medium severity CVE-2018-16887
Patched versions: >= 3.9.0

A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable.

katello SQL Injection vulnerability

medium severity CVE-2018-14623
medium severity CVE-2018-14623

A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable.

katello Improper Privilege Management vulnerability

medium severity CVE-2017-2662
medium severity CVE-2017-2662
Patched versions: >= 3.17.0.rc1

A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id.

Katello cleartext password storage issue

low severity CVE-2019-14825
low severity CVE-2019-14825
Patched versions: >= 3.12.2

A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Author did not declare license for this gem in the gemspec.


This gem version has a GPL-2.0-only license in the source code, however it was not declared in the gemspec file.

This gem version is available.


This gem version has not been yanked and is still available for usage.