Lucene search

K
redhatRedHatRHSA-2015:1592
HistoryAug 12, 2015 - 4:47 a.m.

(RHSA-2015:1592) Important: Red Hat Satellite 6.1.1 on RHEL 6

2015-08-1204:47:35
access.redhat.com
29

0.006 Low

EPSS

Percentile

79.1%

Red Hat Product Security has rated this update as having an important
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

This update provides Satellite 6.1 packages for Red Hat Enterprise Linux 6.
For the full list of new features provided by Satellite 6.1 see the Release
notes linked to in References section. (BZ#1201357)

It was discovered that, in Foreman, the edit_users permission (for example,
granted to the Manager role) allowed the user to edit admin user passwords.
An attacker with the edit_users permission could use this flaw to access
an admin user account, leading to an escalation of privileges.
(CVE-2015-3235)

It was found that Foreman did not set the HttpOnly flag on session cookies.
This could allow a malicious script to access the session cookie.
(CVE-2015-3155)

It was found that when making an SSL connection to an LDAP authentication
source in Foreman, the remote server certificate was accepted without any
verification against known certificate authorities, potentially making
TLS connections vulnerable to man-in-the-middle attacks. (CVE-2015-1816)

A flaw was found in the way Foreman authorized user actions on resources
via the API when an organization was not explicitly set. A remote attacker
could use this flaw to obtain additional information about resources they
were not authorized to access. (CVE-2015-1844)

A cross-site scripting (XSS) flaw was found in Foreman’s template preview
screen. A remote attacker could use this flaw to perform cross-site
scripting attacks by tricking a user into viewing a malicious template.
Note that templates are commonly shared among users. (CVE-2014-3653)

It was found that python-oauth2 did not properly verify the nonce of a
signed URL. An attacker able to capture network traffic of a website using
OAuth2 authentication could use this flaw to conduct replay attacks
against that website. (CVE-2013-4346)

It was found that python-oauth2 did not properly generate random values
for use in nonces. An attacker able to capture network traffic of a website
using OAuth2 authentication could use this flaw to conduct replay attacks
against that website. (CVE-2013-4347)

Red Hat would like to thank Rufus Järnefelt of Coresec for reporting the
Foreman HttpOnly issue.

All users who require Satellite 6.1 are advised to install these new
packages.