CVE-2024-7143

Pulpcore: rbac permissions incorrectly assigned in tasks that create objects

Description

A flaw was found in the Pulp package. When a role-based access control (RBAC) object in Pulp is set to assign permissions on its creation, it uses the `AutoAddObjPermsMixin` (typically the add_roles_for_object_creator method). This method finds the object creator by checking the current authenticated user. For objects that are created within a task, this current user is set by the first user with any permissions on the task object. This means the oldest user with model/domain-level task permissions will always be set as the current user of a task, even if they didn't dispatch the task. Therefore, all objects created in tasks will have their permissions assigned to this oldest user, and the creating user will receive nothing.

Category

8.3
CVSS
Severity: High
CVSS 3.1 •
CVSS 3.0 •
EPSS 0.04%
Vendor Advisory redhat.com
Affected: Red Hat Red Hat Ansible Automation Platform 1.2
Affected: Red Hat Red Hat Ansible Automation Platform 1.2
Affected: Red Hat Red Hat Ansible Automation Platform 1.2
Affected: Red Hat Red Hat Ansible Automation Platform 1.2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Ansible Automation Platform 2
Affected: Red Hat Red Hat Satellite 6
Affected: Red Hat Red Hat Update Infrastructure 4 for Cloud Providers
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-7143?
CVE-2024-7143 has been scored as a high severity vulnerability.
How to fix CVE-2024-7143?
To fix CVE-2024-7143, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-7143 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-7143 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-7143?
CVE-2024-7143 affects Red Hat Red Hat Ansible Automation Platform 1.2, Red Hat Red Hat Ansible Automation Platform 1.2, Red Hat Red Hat Ansible Automation Platform 1.2, Red Hat Red Hat Ansible Automation Platform 1.2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Ansible Automation Platform 2, Red Hat Red Hat Satellite 6, Red Hat Red Hat Update Infrastructure 4 for Cloud Providers.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.