Executive Summary
Summary | |
---|---|
Title | Red Hat OpenShift Enterprise 1.1 update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:0220 | First vendor Publication | 2013-01-31 |
Vendor | RedHat | Last vendor Modification | 2013-01-31 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Red Hat OpenShift Enterprise 1.1 is now available. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Client Tools - noarch Red Hat OpenShift Enterprise Infrastructure - noarch, x86_64 Red Hat OpenShift Enterprise Node - noarch, x86_64 3. Description: Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Refer to the Red Hat OpenShift Enterprise 1.1 Release Notes for information about the changes in this release. The Release Notes will be available shortly from https://access.redhat.com/knowledge/docs/ This update also fixes the following security issues: It was found that the master cryptographic key of Jenkins could be retrieved via the HTTP server that is hosting Jenkins. A remote attacker could use this flaw to access the server and execute arbitrary code with the privileges of the user running Jenkins. Note that this issue only affected Jenkins instances that had slaves attached and that also allowed anonymous read access (not the default configuration). Manual action is also required to correct this issue. Refer to "Jenkins Security Advisory 2013-01-04", linked to in the References, for further information. (CVE-2013-0158) When the rhc-chk script was run in debug mode, its output included sensitive information, such as database passwords, in plain text. As this script is commonly used when troubleshooting, this flaw could lead to users unintentionally exposing sensitive information in support channels (for example, a Bugzilla report). This update removes the rhc-chk script. (CVE-2012-5658) Multiple flaws in the Jenkins web interface could allow a remote attacker to perform HTTP response splitting and cross-site scripting (XSS) attacks, as well as redirecting a victim to an arbitrary page by utilizing an open redirect flaw. (CVE-2012-6072, CVE-2012-6074, CVE-2012-6073) A flaw was found in the way rubygem-activerecord dynamic finders extracted options from method parameters. A remote attacker could possibly use this flaw to perform SQL injection attacks against applications using the Active Record dynamic finder methods. (CVE-2012-6496) The openshift-port-proxy-cfg program created a temporary file in an insecure way. A local attacker could use this flaw to perform a symbolic link attack, overwriting an arbitrary file accessible to the root user with a "0" or a "1", which could lead to a denial of service. By default, OpenShift uses polyinstantiation (per user) for the /tmp/ directory, minimizing the risk of exploitation by local attackers. (CVE-2013-0164) The CVE-2013-0164 issue was discovered by Michael Scherer of the Red Hat Regional IT team. Users of Red Hat OpenShift Enterprise 1.0 are advised to upgrade to Red Hat OpenShift Enterprise 1.1. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 855264 - Can't "rhc app tail" ruby app error_log file when the server's timezone is not EST. 864921 - Exception is seen upon creating domain when no cartridge is installed in node. 872415 - No config setting for default gear capabilities for a new user 873765 - typo in description of man page for oo-admin-ctl-app 873768 - description of man page for oo-admin-ctl-template 874511 - [Installation]"error while loading shared libraries: libruby.so.1.9" is seen in the file /etc/httpd/logs/error_log 874750 - man page for oo-accept-broker defines '-d' for two different options 874751 - man page for oo-accept-broker does not provide acceptable options for auth, storage, and dns switches 874757 - oo-accept-broker usage statement does not match man page options 874799 - oo-admin-chk '-h' option ignored 874845 - oo-admin-ctl-app accepts garbage for a command and returns success. 875657 - [US3036]Some format errors in the prompt message when executing "oo-admin-ctl" and "oo-accept-*" 876324 - httpd ssl.conf and node conf should not intercept requests meant for the broker 876465 - Embedding scalable app (php) with jenkins fails to create a new builder (only via web) 876644 - oo-register-dns is hardcoded to add entries to a BIND server at 127.0.0.1 876937 - Return "FAILED" if trying to stop openshift-console which is already stopped 876939 - Return "FAILED" if trying to stop openshift-port-proxy which is already stopped 877158 - No "log out" button exists for the web console when using basic auth 877407 - [Cartridge] "Node execution failure" when creating app by --enable-jenkins 883527 - Remove oo-setup-bind 885587 - Jenkins server isn't created using option --enable-jenkins without jenkins server name speicified if commander version is 4.0.3 885598 - [client]Should add split charater between each alias-name when execute "rhc domain show" in ruby-1. 8 environment 886159 - Changing the local console port from 3128 to 8118 888043 - Replica set variables in broker.conf not being utilized correctly 888056 - production.rb should not be marked as a conf file 888671 - [Installation]oo-accept-broker or oo-accept-systems will create production.log, the file's permission is wrong. 889062 - CVE-2012-5658 OpenShift Origin: rhc-chk.rb password exposure in log files 889088 - Prompt error message when restore the app 889095 - Database password not printed out when adding db cartridge to applications 889125 - Should remove rhc-chk in rhc client of Enterprise 889649 - CVE-2012-6496 rubygem-activerecord: find_by_* SQL Injection 890607 - CVE-2012-6072 Jenkins: HTTP response splitting 890608 - CVE-2012-6073 Jenkins: open redirect 890612 - CVE-2012-6074 Jenkins: cross-site scripting vulnerability 892781 - Race condition adding multiple SSH keys to gears 892795 - CVE-2013-0158 jenkins: remote unauthenticated retrieval of master cryptographic key (Jenkins Security Advisory 2013-01-04) 892990 - The server address should not be "localhost" on user account info page 893288 - [Console] We should tell them the actual cloud domain they get, not rhcloud.com 893307 - CVE-2013-0164 openshift-origin-port-proxy: openshift-port-proxy-cfg lockwrap() tmp file creation 893895 - "File a bug" link should be Openshift Enterprise 896406 - [Installation]Some warning message when install "rubygem-openshift-origin-node" pacakge. |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-0220.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-20 | Improper Input Validation |
17 % | CWE-310 | Cryptographic Issues |
17 % | CWE-264 | Permissions, Privileges, and Access Controls |
17 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
17 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2014-03-13 | Win.Trojan.Sdconsent outbound connection RuleID : 29644 - Revision : 5 - Type : MALWARE-CNC |
2014-01-10 | Ruby on Rails authlogic session cookie SQL injection attempt RuleID : 25285 - Revision : 3 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-106.nasl - Type : ACT_GATHER_INFO |
2014-01-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201401-22.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0544.nasl - Type : ACT_GATHER_INFO |
2013-03-06 | Name : The remote web server hosts a job scheduling / management system that is affe... File : jenkins_1_498.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0154.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0185.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0244.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Fedora host is missing a security update. File : fedora_2013-0245.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_b4051b5258fa11e2853b00262d5ed8ee.nasl - Type : ACT_GATHER_INFO |
2013-01-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2597.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-02-25 13:20:49 |
|
2013-02-01 00:18:32 |
|