A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper sanitization of user-provided input, allows a remote attacker to inject arbitrary SQL commands into the sort_by parameter of the /api/hosts/bootc_images API endpoint. This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper sanitization of user-provided input, allows a remote attacker to inject arbitrary SQL commands into the sort_by parameter of the /api/hosts/bootc_images API endpoint. This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database. | |
| Title | Rubygem-katello: katello: denial of service and potential information disclosure via sql injection | |
| First Time appeared |
Redhat
Redhat satellite |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:/a:redhat:satellite:6 | |
| Vendors & Products |
Redhat
Redhat satellite |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-17T14:26:57.579Z
Reserved: 2026-03-17T12:30:29.903Z
Link: CVE-2026-4324
Updated: 2026-03-17T14:26:54.303Z
Status : Awaiting Analysis
Published: 2026-03-17T14:16:19.777
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-4324
No data.
OpenCVE Enrichment
No data.