Vulnerability Description
Multiple SQL injection vulnerabilities in the scoped_search function in app/controllers/katello/api/v2/api_controller.rb in Katello allow remote authenticated users to execute arbitrary SQL commands via the (1) sort_by or (2) sort_order parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Katello | Katello | - |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Satellite | 6.1 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2016:1083
- https://bugzilla.redhat.com/show_bug.cgi?id=1322050
- https://github.com/Katello/katello/pull/6051Patch
- https://access.redhat.com/errata/RHSA-2016:1083
- https://bugzilla.redhat.com/show_bug.cgi?id=1322050
- https://github.com/Katello/katello/pull/6051Patch
FAQ
What is CVE-2016-3072?
CVE-2016-3072 is a vulnerability with a CVSS score of 8.8 (HIGH). Multiple SQL injection vulnerabilities in the scoped_search function in app/controllers/katello/api/v2/api_controller.rb in Katello allow remote authenticated users to execute arbitrary SQL commands v...
How severe is CVE-2016-3072?
CVE-2016-3072 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3072?
Check the references section above for vendor advisories and patch information. Affected products include: Katello Katello, Redhat Enterprise Linux, Redhat Satellite.