Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Tue, 17 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper sanitization of user-provided input, allows a remote attacker to inject arbitrary SQL commands into the sort_by parameter of the /api/hosts/bootc_images API endpoint. This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database. | |
| Title | Rubygem-katello: katello: denial of service and potential information disclosure via sql injection | |
| First Time appeared |
Redhat
Redhat satellite |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:/a:redhat:satellite:6 | |
| Vendors & Products |
Redhat
Redhat satellite |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-17T14:26:57.579Z
Reserved: 2026-03-17T12:30:29.903Z
Link: CVE-2026-4324
Updated: 2026-03-17T14:26:54.303Z
Status : Awaiting Analysis
Published: 2026-03-17T14:16:19.777
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-4324
No data.
OpenCVE Enrichment
No data.