(RHSA-2015:1592) Important: Red Hat Satellite 6.1.1 on RHEL 6

2015-08-12T08:47:35
ID RHSA-2015:1592
Type redhat
Reporter RedHat
Modified 2015-08-12T08:53:11

Description

Red Hat Product Security has rated this update as having an important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.

This update provides Satellite 6.1 packages for Red Hat Enterprise Linux 6. For the full list of new features provided by Satellite 6.1 see the Release notes linked to in References section. (BZ#1201357)

It was discovered that, in Foreman, the edit_users permission (for example, granted to the Manager role) allowed the user to edit admin user passwords. An attacker with the edit_users permission could use this flaw to access an admin user account, leading to an escalation of privileges. (CVE-2015-3235)

It was found that Foreman did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie. (CVE-2015-3155)

It was found that when making an SSL connection to an LDAP authentication source in Foreman, the remote server certificate was accepted without any verification against known certificate authorities, potentially making TLS connections vulnerable to man-in-the-middle attacks. (CVE-2015-1816)

A flaw was found in the way Foreman authorized user actions on resources via the API when an organization was not explicitly set. A remote attacker could use this flaw to obtain additional information about resources they were not authorized to access. (CVE-2015-1844)

A cross-site scripting (XSS) flaw was found in Foreman's template preview screen. A remote attacker could use this flaw to perform cross-site scripting attacks by tricking a user into viewing a malicious template. Note that templates are commonly shared among users. (CVE-2014-3653)

It was found that python-oauth2 did not properly verify the nonce of a signed URL. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website. (CVE-2013-4346)

It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website. (CVE-2013-4347)

Red Hat would like to thank Rufus Järnefelt of Coresec for reporting the Foreman HttpOnly issue.

All users who require Satellite 6.1 are advised to install these new packages.