{"api_version":"1","generated_at":"2026-04-22T23:31:15+00:00","cve":"CVE-2021-4142","urls":{"html":"https://cve.report/CVE-2021-4142","api":"https://cve.report/api/cve/CVE-2021-4142.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-4142","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-4142"},"summary":{"title":"CVE-2021-4142","description":"The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-08-24 16:15:00","updated_at":"2023-11-07 03:40:00"},"problem_types":["CWE-639"],"metrics":[],"references":[{"url":"https://github.com/candlepin/candlepin/pull/3199","name":"https://github.com/candlepin/candlepin/pull/3199","refsource":"MISC","tags":[],"title":"[3.1] Disallow authN with SCA certificate by nikosmoum · Pull Request #3199 · candlepin/candlepin · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/security/cve/CVE-2021-4142","name":"https://access.redhat.com/security/cve/CVE-2021-4142","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/errata/RHSA-2022:0790","name":"https://access.redhat.com/errata/RHSA-2022:0790","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034346","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2034346","refsource":"MISC","tags":[],"title":"2034346 – (CVE-2021-4142) CVE-2021-4142 Satellite: Allow unintended SCA certificate to authenticate Candlepin","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/errata/RHSA-2022:5498","name":"https://access.redhat.com/errata/RHSA-2022:5498","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/candlepin/candlepin/pull/3198","name":"https://github.com/candlepin/candlepin/pull/3198","refsource":"MISC","tags":[],"title":"[4.0] Disallow authN with SCA certificate by nikosmoum · Pull Request #3198 · candlepin/candlepin · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/candlepin/candlepin/pull/3197","name":"https://github.com/candlepin/candlepin/pull/3197","refsource":"MISC","tags":[],"title":"[3.2] Disallow authN with SCA certificate by nikosmoum · Pull Request #3197 · candlepin/candlepin · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-4142","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4142","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"4142","vulnerable":"1","versionEndIncluding":"3.1.28-2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"candlepinproject","cpe5":"candlepin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4142","vulnerable":"1","versionEndIncluding":"3.2.21-1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"candlepinproject","cpe5":"candlepin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4142","vulnerable":"1","versionEndIncluding":"4.1.8-1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"candlepinproject","cpe5":"candlepin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-4142","qid":"240123","title":"Red Hat Update for Satellite 6.10 (RHSA-2022:0790)"},{"cve":"CVE-2021-4142","qid":"240566","title":"Red Hat Update for Satellite 6.11 Release (RHSA-2022:5498)"},{"cve":"CVE-2021-4142","qid":"960505","title":"Rocky Linux Security Update for Satellite (RLSA-2022:5498)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2021-4142","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639 - Authorization Bypass Through User-Controlled Key -> CWE-287 - Improper Authentication","cweId":"CWE-639"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"candlepin","version":{"version_data":[{"version_affected":"=","version_value":"Affects v3.1.28-2, v3.2.21-1, v4.1.8-1 and earlier are affected."}]}}]}}]}},"references":{"reference_data":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034346","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2034346"},{"url":"https://access.redhat.com/security/cve/CVE-2021-4142","refsource":"MISC","name":"https://access.redhat.com/security/cve/CVE-2021-4142"},{"url":"https://github.com/candlepin/candlepin/pull/3199","refsource":"MISC","name":"https://github.com/candlepin/candlepin/pull/3199"},{"url":"https://github.com/candlepin/candlepin/pull/3197","refsource":"MISC","name":"https://github.com/candlepin/candlepin/pull/3197"},{"url":"https://github.com/candlepin/candlepin/pull/3198","refsource":"MISC","name":"https://github.com/candlepin/candlepin/pull/3198"}]}},"nvd":{"publishedDate":"2022-08-24 16:15:00","lastModifiedDate":"2023-11-07 03:40:00","problem_types":["CWE-639"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1.0","versionEndIncluding":"4.1.8-1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.0","versionEndIncluding":"3.2.21-1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndIncluding":"3.1.28-2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"4142","Ordinal":"223570","Title":"CVE-2021-4142","CVE":"CVE-2021-4142","Year":"2021"},"notes":[]}}}