Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Red Hat OpenShift Enterprise 3.1.1 bug fix and enhancement update
Informations
Name RHSA-2016:0070 First vendor Publication 2016-01-26
Vendor RedHat Last vendor Modification 2016-01-26
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Red Hat OpenShift Enterprise release 3.1.1 is now available with updates to packages that fix several security issues, bugs and introduce feature enhancements.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

RHOSE 3.1 - noarch, x86_64

3. Description:

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

The following security issues are addressed with this release:

An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain requests. An authenticated remote attacker could use this flaw to gain additional access to resources such as RAM and disk space. (CVE-2016-1905)

An authorization flaw was discovered in Kubernetes; the API server did not properly check user permissions when handling certain build- configuration strategies. A remote attacker could create build configurations with strategies that violate policy. Although the attacker could not launch the build themselves (launch fails when the policy is violated), if the build configuration files were later launched by other privileged services (such as automated triggers), user privileges could be bypassed allowing attacker escalation. (CVE-2016-1906)

An update for Jenkins Continuous Integration Server that addresses a large number of security issues including XSS, CSRF, information disclosure and code execution have been addressed as well. (CVE-2013-2186, CVE-2014-1869, CVE-2014-3661, CVE-2014-3662 CVE-2014-3663, CVE-2014-3664, CVE-2014-3666, CVE-2014-3667 CVE-2014-3680, CVE-2014-3681, CVE-2015-1806, CVE-2015-1807 CVE-2015-1808, CVE-2015-1810, CVE-2015-1812, CVE-2015-1813 CVE-2015-1814, CVE-2015-5317, CVE-2015-5318, CVE-2015-5319 CVE-2015-5320, CVE-2015-5321, CVE-2015-5322, CVE-2015-5323 CVE-2015-5324, CVE-2015-5325, CVE-2015-5326 ,CVE-2015-7537 CVE-2015-7538, CVE-2015-7539, CVE-2015-8103)

Space precludes documenting all of the bug fixes and enhancements in this advisory. See the OpenShift Enterprise 3.1 Release Notes, which will be updated shortly for release 3.1.1, for details about these changes:

https://docs.openshift.com/enterprise/3.1/release_notes/ose_3_1_release_not es.html

All OpenShift Enterprise 3 users are advised to upgrade to these updated packages.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

See the OpenShift Enterprise 3.1 documentation, which will be updated shortly for release 3.1.1, for important instructions on how to upgrade your OpenShift cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/enterprise/3.1/release_notes/ose_3_1_release_not es.html

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.

5. Bugs fixed (https://bugzilla.redhat.com/):

974814 - CVE-2013-2186 Apache commons-fileupload: Arbitrary file upload via deserialization 1063099 - CVE-2014-1869 stapler-adjunct-zeroclipboard: multiple cross-site scripting (XSS) flaws 1147758 - CVE-2014-3661 jenkins: denial of service (SECURITY-87) 1147759 - CVE-2014-3662 jenkins: username discovery (SECURITY-110) 1147764 - CVE-2014-3663 jenkins: job configuration issues (SECURITY-127, SECURITY-128) 1147765 - CVE-2014-3664 jenkins: directory traversal flaw (SECURITY-131) 1147766 - CVE-2014-3681 jenkins: cross-site scripting flaw in Jenkins core (SECURITY-143) 1147769 - CVE-2014-3666 jenkins: remote code execution flaw (SECURITY-150) 1147770 - CVE-2014-3667 jenkins: plug-in code can be downloaded by anyone with read access (SECURITY-155) 1148645 - CVE-2014-3680 jenkins: password exposure in DOM (SECURITY-138) 1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) 1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180) 1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125) 1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162) 1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163) 1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) 1243514 - there is possibly a race / error / startup dependency condition where the master's node/sdn doesn't start up properly on boot 1247523 - [RFE]-UI only includes first port in generated service 1254880 - Secure communication for Heapster metric collection 1256869 - Deleting Users and Identity does not remove Authorization Settings 1268478 - docker builder cannot retrieve source from git when user name is not a private git repository. 1273739 - Event shows "Cloud provider not initialized properly" when creating pod with cinder PV 1277329 - Core dump when running openshift for several days 1277383 - ovs-port wasn't deleted when openshift deleted pods 1277608 - NFS Recycler Fails in containerized Kubernetes 1278232 - if build fails to schedule because of quota, and pod count is reduced, build never automatically starts 1278630 - oc rollback says it is doing something, but doesn't appear to do it 1279404 - The clustered mysql pod keeps CrashLoopBackOff for cannot create directory '/var/lib/mysql/data/mysql': Permission denied 1279744 - postgresql-92-rhel7 cannot startup on AEP env 1279925 - After installation, openshift-sdn didn't make /etc/openshift-sdn/config.env, and can't access to the pod 1280216 - Setting env vars via Web UI not visible in the assemble phase of STI build (https://github.com/openshift/origin/issues/5817) 1280497 - [Supportability] Build OpenShift with DWARF 1282359 - CVE-2015-5317 jenkins: Project name disclosure via fingerprints (SECURITY-153) 1282361 - CVE-2015-5318 jenkins: Public value used for CSRF protection salt (SECURITY-169) 1282362 - CVE-2015-5319 jenkins: XXE injection into job configurations via CLI (SECURITY-173) 1282363 - CVE-2015-5320 jenkins: Secret key not verified when connecting a slave (SECURITY-184) 1282364 - CVE-2015-5321 jenkins: Information disclosure via sidepanel (SECURITY-192) 1282365 - CVE-2015-5322 jenkins: Local file inclusion vulnerability (SECURITY-195) 1282366 - CVE-2015-5323 jenkins: API tokens of other users available to admins (SECURITY-200) 1282367 - CVE-2015-5324 jenkins: Queue API did show items not visible to the current user (SECURITY-186) 1282368 - CVE-2015-5325 jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) 1282369 - CVE-2015-5326 jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) 1282371 - CVE-2015-8103 jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218) 1282426 - The secret cannot be recognized which was added via .docker/config.json 1282738 - Mysql Can't handle MYSQL_USER=root case 1283952 - Default haproxy 503 response lack HTTP response header 1284506 - tuned-profiles-atomic-openshift-node man is not updated to "atomic-openshift-X" new naming 1287414 - Wrong prompt message for oc attach regardless of parameter values 1287943 - When cancel a build the build status always become failed 1288014 - Panic, if redhat/openshift-ovs-multitenant is enabled. 1289603 - oc login fails with Unauthorized error sometimes on HA etcd environment 1289965 - node crashed 1290643 - Wrong Forwarded Header format 1290967 - Hostsubnet is not created and OSE node host doesn't do OVS setup 1291795 - CVE-2015-7537 jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) 1291797 - CVE-2015-7538 jenkins: CSRF protection ineffective (SECURITY-233) 1291798 - CVE-2015-7539 jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) 1292621 - jenkins-ephemeral template points at centos instead of rhel 1293251 - Can not access service endpoint between different nodes. 1293252 - Can not push images to docker-registry 1293829 - Return 'read time out‘ in jenkins webconsole when trigger a build more than 2 minites 1293877 - Postgresql pod is CrashLoopBackOff after add nfs volume to dc/rc 1294115 - Get error status 404 when trying to push result image to internal docker registry if registry is temporarily down and resumed immediately 1294798 - BuildConfig field for 'Perform builds in OpenShift' build step in Jenkins configure Job form is populated with default value of 'frontend' instead of actual stored value. 1296457 - Sometimes Persistent Volume can not become available after it is created 1297910 - CVE-2016-1905 Kubernetes api server: patch operation should use patched object to check admission control 1297916 - CVE-2016-1906 Kubernetes api server: build config to a strategy that isn't allowed by policy

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2016-0070.html

CWE : Common Weakness Enumeration

% Id Name
23 % CWE-264 Permissions, Privileges, and Access Controls
19 % CWE-200 Information Exposure
16 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
10 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)
6 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
6 % CWE-284 Access Control (Authorization) Issues
6 % CWE-20 Improper Input Validation
3 % CWE-502 Deserialization of Untrusted Data
3 % CWE-399 Resource Management Errors
3 % CWE-345 Insufficient Verification of Data Authenticity
3 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19947
 
Oval ID: oval:org.mitre.oval:def:19947
Title: USN-2029-1 -- libcommons-fileupload-java vulnerability
Description: Apache Commons FileUpload could be made to overwrite files.
Family: unix Class: patch
Reference(s): USN-2029-1
CVE-2013-2186
Version: 5
Platform(s): Ubuntu 10.04
Product(s): libcommons-fileupload-java
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20856
 
Oval ID: oval:org.mitre.oval:def:20856
Title: DSA-2827-1 libcommons-fileupload-java - arbitrary file upload via deserialization
Description: It was discovered that Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications, incorrectly handled file names with NULL bytes in serialized instances. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process.
Family: unix Class: patch
Reference(s): DSA-2827-1
CVE-2013-2186
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): libcommons-fileupload-java
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 656
Application 1
Application 1
Application 3
Application 1
Application 32
Application 2
Application 16
Os 1
Os 1

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-07-16 IAVM : 2015-A-0154 - Multiple Vulnerabilities in Oracle Fusion Middleware
Severity : Category I - VMSKEY : V0061081

Snort® IPS/IDS

Date Description
2016-03-29 Java Library CommonsCollection unauthorized serialized object attempt
RuleID : 37860 - Revision : 5 - Type : SERVER-WEBAPP
2016-03-29 Java Library CommonsCollection unauthorized serialized object attempt
RuleID : 37859 - Revision : 6 - Type : SERVER-WEBAPP
2016-03-14 Java Library CommonsCollection unauthorized serialized object attempt
RuleID : 36826 - Revision : 11 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-d7e5461dbf.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-d02feebd15.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-a433d8ba72.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-938c70c840.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-89468612f5.nasl - Type : ACT_GATHER_INFO
2015-12-10 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_23af04259eac11e5b93700e0814cab4e.nasl - Type : ACT_GATHER_INFO
2015-11-17 Name : The remote web server is affected by a remote code execution vulnerability.
File : jenkins_security218.nasl - Type : ACT_GATHER_INFO
2015-04-22 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-5430.nasl - Type : ACT_GATHER_INFO
2015-04-22 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-5643.nasl - Type : ACT_GATHER_INFO
2015-04-20 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-5637.nasl - Type : ACT_GATHER_INFO
2015-04-20 Name : The remote Fedora host is missing a security update.
File : fedora_2015-5466.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2013-1428.nasl - Type : ACT_GATHER_INFO
2014-11-04 Name : The remote web server hosts a job scheduling and management system that is af...
File : jenkins_1_583.nasl - Type : ACT_GATHER_INFO
2014-10-02 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_549a277149cc11e4ae2cc80aa9043978.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-786.nasl - Type : ACT_GATHER_INFO
2013-12-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2827.nasl - Type : ACT_GATHER_INFO
2013-11-13 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2029-1.nasl - Type : ACT_GATHER_INFO
2013-11-13 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_jakarta-commons-fileupload-131017.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2016-03-10 05:28:27
  • Multiple Updates
2016-03-09 21:29:20
  • Multiple Updates
2016-03-03 17:25:54
  • Multiple Updates
2016-03-02 05:28:39
  • Multiple Updates
2016-02-26 00:28:05
  • Multiple Updates
2016-02-25 21:29:00
  • Multiple Updates
2016-02-11 08:49:16
  • Multiple Updates
2016-02-11 05:29:11
  • Multiple Updates
2016-02-11 00:29:29
  • Multiple Updates
2016-02-10 21:29:34
  • Multiple Updates
2016-02-10 17:29:16
  • Multiple Updates
2016-02-10 13:28:06
  • Multiple Updates
2016-02-10 09:29:09
  • Multiple Updates
2016-02-10 05:29:24
  • Multiple Updates
2016-02-06 05:29:18
  • Multiple Updates
2016-02-05 09:29:31
  • Multiple Updates
2016-02-03 21:31:27
  • Multiple Updates
2016-01-27 09:27:18
  • Multiple Updates
2016-01-27 09:22:47
  • First insertion