what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2015-0028-01

Red Hat Security Advisory 2015-0028-01
Posted Jan 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0028-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. It was found that CloudForms Management Engine exposed SQL filters via the REST API without any input escaping. An authenticated user could use this flaw to perform SQL injection attacks against the CloudForms Management Engine database.

tags | advisory, web, sql injection, ruby
systems | linux, redhat
advisories | CVE-2014-3692, CVE-2014-7814
SHA-256 | 8a56d3fa80b7922b97a12c02b14567a25741582063179eb604ec9b68d183c0f7

Red Hat Security Advisory 2015-0028-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: cfme security, bug fix, and enhancement update
Advisory ID: RHSA-2015:0028-01
Product: Red Hat CloudForms
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0028.html
Issue date: 2015-01-14
CVE Names: CVE-2014-3692 CVE-2014-7814
=====================================================================

1. Summary:

Updated cfme packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat CloudForms 3.1.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.3 - noarch, x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

It was found that CloudForms Management Engine exposed SQL filters via the
REST API without any input escaping. An authenticated user could use this
flaw to perform SQL injection attacks against the CloudForms Management
Engine database. (CVE-2014-7814)

It was found that the CloudForms Management Engine customization template
used a default root password for newly created images if no root password
was specified. (CVE-2014-3692)

These issues were discovered by the Red Hat CloudForms Team.

This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available from the Technical Notes
document linked to in the References section.

All cfme users are advised to upgrade to these updated packages, which
contain correct these issues and add these enhancements.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1145304 - All Passwords visible in UI when viewing page source
1151258 - CVE-2014-3692 CFME: default fallback password in customization_templates.yml
1157881 - CVE-2014-7814 CFME: REST API SQL Injection
1161265 - Button triggered automate actions do not work
1161761 - Automate Explorer: "Error during 'save': Validation failed: Datatype is not included in the list" when trying to save input parameters for a Method
1163384 - UI: Missing route error for forest_delete action in Configuration/Configure/Settings/Authentication
1163875 - RedHat domain - OSE automate model initial checkin.
1164034 - Performance by Asset Type report undefined method error
1164035 - [RFE] Need ability to properly override service request message.
1164036 - Excon::Errors::Conflict]: Expected([200, 202]) <=> Actual(409 Conflict) with 2 security groups of the same name in the same tenant
1165305 - Openstack inventory collection fails with missing instances
1166214 - Callback url routing issue
1166215 - Chargeback throws "undefined method '[]' for nil:NilClass [configuration/form_field_changed]"
1166286 - Setting start page as Clouds/Availability Zones shows "Page doesnt exist"
1166290 - Text "Custom reports" displayed twice in import/Export Custom reports
1168336 - UI: Missing routes error on Infra/Cloud Provider & Resource Pool list views when user has saved searches
1168384 - Sorting and Paging does not work in Chargeback Rates list
1168564 - UI: Unable to save a dashboard change after moving a widget to a different spot
1170320 - Ext3 directory code should account for nil entries
1170682 - Update miq_ae_service_snapshot.rb with new relationship of vm_or_template
1170794 - Unable to create dashboard widget for trending reports or filter
1171343 - Deleting a Cluster with many policy_events takes forever and times out.
1171346 - ManageIQ - Resolve file differences resulting from model import/export round trip.
1171821 - 5.3.2.2 doesn't start evmserverd
1171899 - Storage: Adding a new Storage Manager does not work. Crashes with the error - Error caught: [ArgumentError] wrong number of arguments (2 for 1)
1172491 - Unable to schedule backup of internal vmdb_production DB using CFME console
1179957 - ose_installer fails with uninitialized constant FileUtils
1179959 - ose_installer fails with No such file or directory - /root/.openshift/oo-install-cfg.yml

6. Package List:

CloudForms Management Engine 5.3:

Source:
cfme-5.3.2.6-1.el6cf.src.rpm
ruby193-rubygem-fog-1.19.0-2.el6cf.src.rpm
ruby193-rubygem-linux_admin-0.9.4-1.el6cf.src.rpm

noarch:
ruby193-rubygem-fog-1.19.0-2.el6cf.noarch.rpm
ruby193-rubygem-linux_admin-0.9.4-1.el6cf.noarch.rpm

x86_64:
cfme-5.3.2.6-1.el6cf.x86_64.rpm
cfme-appliance-5.3.2.6-1.el6cf.x86_64.rpm
cfme-debuginfo-5.3.2.6-1.el6cf.x86_64.rpm
cfme-lib-5.3.2.6-1.el6cf.x86_64.rpm
mingw32-cfme-host-5.3.2.6-1.el6cf.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2014-3692
https://access.redhat.com/security/cve/CVE-2014-7814
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-US/CloudForms/3.1/html/Management_Engine_5.3_Technical_Notes/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFUttEkXlSAg2UNWIIRAioAAJ91U93e5A+kVUSN7y0kDE3hHfgc6ACglGr0
JD8CJb2SB7Q69xXsenVeD4k=
=fzvp
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close