{
  "threat_severity" : "Important",
  "public_date" : "2024-10-09T00:42:00Z",
  "bugzilla" : {
    "description" : "foreman: foreman: OAuth secret exposure via unauthenticated access to the GraphQL API",
    "id" : "2317450",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2317450"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-200",
  "details" : [ "A disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API.", "A disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API." ],
  "statement" : "This vulnerability was reported for an End of Life Product and does not affect any current supported Red Hat Products. The fix was included in foreman version 3.3 which was first shipped in Satellite 6.12.",
  "acknowledgement" : "Red Hat would like to thank Sébastien Vecten for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.12 for RHEL 8",
    "release_date" : "2022-11-16T00:00:00Z",
    "advisory" : "RHSA-2022:8506",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.12::el8",
    "package" : "foreman-0:3.3.0.17-1.el8sat"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "satellite-capsule:el8/foreman",
    "cpe" : "cpe:/a:redhat:satellite:6"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "satellite:el8/foreman",
    "cpe" : "cpe:/a:redhat:satellite:6"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "satellite-utils:el8/foreman",
    "cpe" : "cpe:/a:redhat:satellite:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-6861\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-6861\nhttps://docs.theforeman.org/3.3/Release_Notes/index-katello.html#_foreman_2\nhttps://projects.theforeman.org/issues/34328" ],
  "name" : "CVE-2024-6861",
  "mitigation" : {
    "value" : "To mitigate this issue the GraphQL introspection feature must be disabled or the GraphQL API be disabled entirely.\nMalicious requests can also be filtered using a reverse proxy or directly in the web server configuration.",
    "lang" : "en:us"
  },
  "csaw" : false
}