You are here

V-041: Red Hat CloudForms Multiple Vulnerabilities

December 6, 2012 - 4:01am

Addthis

PROBLEM:

Red Hat CloudForms Multiple Vulnerabilities

PLATFORM:

CloudForms

ABSTRACT:

Multiple vulnerabilities have been reported in Red Hat CloudForms

REFERENCE LINKS:

RHSA-2012-1542-1
RHSA-2012-1543-1
Secunia Advisory SA51472
CVE-2012-1986 
CVE-2012-1987 
CVE-2012-1988 
CVE-2012-2139 
CVE-2012-2140 
CVE-2012-2660 
CVE-2012-2661 
CVE-2012-2694 
CVE-2012-2695 
CVE-2012-3424 
CVE-2012-3463 
CVE-2012-3464 
CVE-2012-3465 
CVE-2012-3538 
CVE-2012-3864 
CVE-2012-3865 
CVE-2012-3867 
CVE-2012-4574 
CVE-2012-5603
CVE-2012-5605

IMPACT ASSESSMENT:

Medium

DISCUSSION:

Multiple vulnerabilities have been reported in Red Hat CloudForms, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, and perform certain actions with escalated privileges, by malicious users to disclose and manipulate certain data and cause a DoS (Denial of Service), and by malicious people to conduct cross-site scripting and SQL injection attacks, bypass certain security restrictions, manipulate certain data, cause a DoS, and compromise a vulnerable system.

1) An error due to Katello not properly checking user permissions can be exploited to download consumer certificates or change settings of other users' system.

Successful exploitation of this vulnerability requires knowledge of the UUID of the target system.

2) An error exists due to Pulp logging administrative passwords to a world readable log file.

3) An error due to Pulp's configuration file (pulp.conf) being installed as world readable can be exploited to disclose e.g. the administrative password.

4) An error due to grinder having insecure permissions for the cache folder (/var/lib/pulp/cache/grinder) can be exploited to access and modify cache files.

5) Errors exists due to the application bundles a vulnerable version of Ruby.

6) Errors exists due to the application bundles a vulnerable version of Puppet.

IMPACT:

Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS

SOLUTION:

Updated packages are available via Red Hat Network.

Addthis