Bug 2034346 (CVE-2021-4142)

Summary: CVE-2021-4142 Satellite: Allow unintended SCA certificate to authenticate Candlepin
Product: [Other] Security Response Reporter: Yadnyawalk Tale <ytale>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bbuckingham, bcourt, bhoefer, btotty, ehelms, jsherril, lzap, mhulan, mmccune, myarboro, nmoumoul, orabin, pcreech, rchan, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-03-11 14:31:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2034349, 2043714    
Bug Blocks: 2028398, 2034366    

Description Yadnyawalk Tale 2021-12-20 18:40:34 UTC
Red Hat Satellite was affected by an improper authentication in which few factors allow for someone to use the SCA (simple content access) certificate for authentication with Candlepin. The SCA certificates are purposed only for authorizing content access against the CDN (or Pulp in case of Satellite).

Comment 4 Yadnyawalk Tale 2022-01-17 11:39:53 UTC
Candlepin versions 3.1.28-2, 3.2.21-1, 4.1.8-1 and earlier are affected.

Comment 5 errata-xmlrpc 2022-03-08 21:26:07 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.10 for RHEL 7

Via RHSA-2022:0790 https://access.redhat.com/errata/RHSA-2022:0790

Comment 7 Product Security DevOps Team 2022-03-11 14:31:30 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-4142

Comment 10 errata-xmlrpc 2022-07-05 14:27:25 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.11 for RHEL 7
  Red Hat Satellite 6.11 for RHEL 8

Via RHSA-2022:5498 https://access.redhat.com/errata/RHSA-2022:5498