Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
TitleCloudForms 4.6.8 security, bug fix and enhancement update
NameRHSA-2019:0315First vendor Publication2019-02-12
VendorRedHatLast vendor Modification2019-02-12
Severity (Vendor) N/ARevision01

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


Problem Description:

An update is now available for CloudForms Management Engine 5.9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.9 - x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.

Security Fix(es):

* rubygem-sinatra: XSS in the 400 Bad Request page (CVE-2018-11627)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:


If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1585218 - CVE-2018-11627 rubygem-sinatra: XSS in the 400 Bad Request page 1641669 - 404 Not Found: When dialog submitted via custom button from datastore object with method and dialog both attached 1641812 - Retirement Requester not populated after retirement 1650152 - [RFE] Unable to use AWS tags as RHV tags 1658480 - Instance evacuation error 1665284 - Tagging: Unable to edit tag from container provider page 1667948 - Dynamic drop down code is being executed everytime a service request is opened for review and executed again on approval 1668847 - Events from OpenStack are delivered in wrong order which causes miss of certain events 1669627 - SmartState Analysis fails on VMware Vsphere 6.7 1670202 - The event_streams table does not get auto-vacuumed

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2019-0315.html

CWE : Common Weakness Enumeration

100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration


Nessus® Vulnerability Scanner

2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-3f61c5cf7c.nasl - Type : ACT_GATHER_INFO
2018-08-02Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_ca05d9daac1d41138a05ffe9cd0d6160.nasl - Type : ACT_GATHER_INFO
2018-06-25Name : The remote Fedora host is missing a security update.
File : fedora_2018-0b17e1e529.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2019-02-17 13:18:10
  • First insertion