Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Red Hat Gluster Storage Web Administration security update
Informations
Name RHSA-2019:0265 First vendor Publication 2019-02-04
Vendor RedHat Last vendor Modification 2019-02-04
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Cvss Base Score 5.8 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated packages are now available for Red Hat Gluster Storage 3.4 Web Administration Batch Update 3 on Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Gluster 3.4 Web Administration Node Agent on RHEL-7 - noarch Red Hat Gluster 3.4 Web Administration on RHEL-7 - noarch, x86_64

3. Description:

Red Hat Gluster Storage Web Administration includes a fully automated setup based on Ansible and provides deep metrics and insights into active Gluster storage pools by using the Grafana platform. Red Hat Gluster Storage WebAdministration provides a dashboard view which allows an administrator to get a view of overall gluster health in terms of hosts, volumes, bricks, and other components of GlusterFS.

Security Fix(es):

* django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' (CVE-2018-7536)

* django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html' (CVE-2018-7537)

* django: Open redirect possibility in CommonMiddleware (CVE-2018-14574)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank the Django project for reporting CVE-2018-7536 and CVE-2018-7537.

Users of Red Hat Gluster Storage Web Administration with Red Hat Gluster Storage are advised to upgrade to this updated package to fix these issues.

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1549777 - CVE-2018-7536 django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' 1549779 - CVE-2018-7537 django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html' 1609031 - CVE-2018-14574 django: Open redirect possibility in CommonMiddleware 1654338 - tendrl-commons doesn't specify minimal ansible version it requires 1655424 - Need to change graphite db initialization command in tendrl-ansible as per new graphite-web version-1.1.4-1 1655433 - Need to restrict few services port from outside access to web-admin 1658245 - graphite data migration process from graphite-web-0.X.X to graphite-web-1.X.X should done from tendrl-upgrade script 1659678 - Grafana unable to fetch data after updating graphite-web to 1.x.x 1660779 - After migration to graphite-1.1.4 the brick specific dashboards are not visible in grafana

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2019-0265.html

CWE : Common Weakness Enumeration

% Id Name
67 % CWE-185 Incorrect Regular Expression
33 % CWE-601 URL Redirection to Untrusted Site ('Open Redirect') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 176
Application 2
Os 4
Os 3

Nessus® Vulnerability Scanner

Date Description
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-0c85690ba7.nasl - Type : ACT_GATHER_INFO
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-39cc0bc342.nasl - Type : ACT_GATHER_INFO
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-6fa1017c1d.nasl - Type : ACT_GATHER_INFO
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-cce0e0bd04.nasl - Type : ACT_GATHER_INFO
2018-08-06 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4264.nasl - Type : ACT_GATHER_INFO
2018-04-02 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4161.nasl - Type : ACT_GATHER_INFO
2018-03-16 Name : The remote Fedora host is missing a security update.
File : fedora_2018-bd1147f152.nasl - Type : ACT_GATHER_INFO
2018-03-09 Name : The remote Debian host is missing a security update.
File : debian_DLA-1303.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2019-02-04 13:18:50
  • First insertion