Lucene search

K
redhatRedHatRHSA-2015:1591
HistoryAug 12, 2015 - 4:38 a.m.

(RHSA-2015:1591) Important: Red Hat Satellite 6.1.1 on RHEL 7

2015-08-1204:38:51
access.redhat.com
99

EPSS

0.006

Percentile

79.2%

Red Hat Satellite is a systems management tool for Linux-based
infrastructures. It allows for provisioning, remote management and
monitoring of multiple Linux deployments with a single, centralized tool.
It performs provisioning and configuration management of predefined
standard operating environments.

This update provides Satellite 6.1 packages for Red Hat Enterprise Linux 7.
For the full list of new features provided by Satellite 6.1 see the Release
notes linked to in references section. (BZ#1201357)

It was discovered that in Foreman the edit_users permissions (for example,
granted to the Manager role) allowed the user to edit admin user passwords.
An attacker with the edit_users permissions could use this flaw to access
an admin user account, leading to an escalation of privileges.
(CVE-2015-3235)

It was found that Foreman did not set the HttpOnly flag on session cookies.
This could allow a malicious script to access the session cookie.
(CVE-2015-3155)

It was found that when making an SSL connection to an LDAP authentication
source in Foreman, the remote server certificate was accepted without any
verification against known certificate authorities, potentially making
TLS connections vulnerable to man-in-the-middle attacks. (CVE-2015-1816)

A flaw was found in the way foreman authorized user actions on resources
via the API when an organization was not explicitly set. A remote attacker
could use this flaw to obtain additional information about resources they
were not authorized to access. (CVE-2015-1844)

A cross-site scripting (XSS) flaw was found in Foreman’s template preview
screen. A remote attacker could use this flaw to perform cross-site
scripting attacks by tricking a user into viewing a malicious template.
Note that templates are commonly shared among users. (CVE-2014-3653)

It was found that python-oauth2 did not properly verify the nonce of a
signed URL. An attacker able to capture network traffic of a website using
OAuth2 authentication could use this flaw to conduct replay attacks
against that website. (CVE-2013-4346)

It was found that python-oauth2 did not properly generate random values
for use in nonces. An attacker able to capture network traffic of a website
using OAuth2 authentication could use this flaw to conduct replay attacks
against that website. (CVE-2013-4347)

Red Hat would like to thank Rufus Järnefelt of Coresec for reporting the
foreman HttpOnly issue.

All users who require Satellite 6.1 are advised to install these new packages.