CVE-2018-14623 – katello: SQL inject in errata-related REST API
https://notcve.org/view.php?id=CVE-2018-14623
A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulnerable. Se ha encontrado un error de inyección SQL en la API relacionada con erratas de katello. • http://www.securityfocus.com/bid/106224 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623 https://access.redhat.com/security/cve/CVE-2018-14623 https://bugzilla.redhat.com/show_bug.cgi?id=1623719 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2017-2662 – foreman: Managing repositories with their id via hammer does not respect the role filters
https://notcve.org/view.php?id=CVE-2017-2662
A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id. Se ha detectado un fallo en la versión 3.4.5 del plugin katello de Foreman. Después de establecer un nuevo rol para permitir el acceso restringido a un repositorio con un filtro (filtro establecido en el nombre del producto), el filtro no se respeta cuando las acciones se realizan a través de hammer usando el id del repositorio. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2662 https://projects.theforeman.org/issues/18838 https://access.redhat.com/security/cve/CVE-2017-2662 https://bugzilla.redhat.com/show_bug.cgi?id=1434106 • CWE-269: Improper Privilege Management CWE-862: Missing Authorization •
CVE-2016-9595 – katello-debug: Possible symlink attacks due to use of predictable file names
https://notcve.org/view.php?id=CVE-2016-9595
A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files. Se ha encontrado un fallo en katello-debug en versiones anteriores a la 3.4.0, donde determinados scripts y archivos de log utilizaban archivos temporales no seguros. Un usuario local podría explotar esta vulnerabilidad para llevar a cabo un ataque de enlace simbólico que les permita sobrescribir el contenido de archivos arbitrarios. A flaw was found in katello-debug where certain scripts and log files used insecure temporary files. • https://access.redhat.com/errata/RHSA-2018:0336 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595 https://access.redhat.com/security/cve/CVE-2016-9595 https://bugzilla.redhat.com/show_bug.cgi?id=1406729 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •
CVE-2013-2143 – Katello (RedHat Satellite) - users/update_roles Missing Authorisation
https://notcve.org/view.php?id=CVE-2013-2143
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account. El controlador de usuarios en Katello 1.5.0-14 y anteriores, y Red Hat Satellite, no comprueba autorización para la acción update_roles, lo que permite a usuarios remotos autenticados ganar privilegios mediante la configuración de una cuenta de usuario hacia una cuenta de administrador. • https://www.exploit-db.com/exploits/32515 http://packetstormsecurity.com/files/125866/Katello-Red-Hat-Satellite-users-update_roles-Missing-Authorization.html http://www.exploit-db.com/exploits/32515 http://www.osvdb.org/104981 http://www.securityfocus.com/bid/66434 https://bugzilla.redhat.com/show_bug.cgi?id=970849 • CWE-20: Improper Input Validation CWE-862: Missing Authorization •
CVE-2012-3503 – Katello: Application.config.secret_token is not generated properly
https://notcve.org/view.php?id=CVE-2012-3503
The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token. El script de instalación en Katello 1.0 y anteriores no genera correctamente el valor Application.config.secret_token, lo que hace que cada instalación por defecto tenga el mismo testigo secreto, y permite a atacantes remotos autenticarse en el sistema de interfaz web CloudForms Engine como un usuario arbitrario creando una cookie mediante el secret_token por defecto. • http://rhn.redhat.com/errata/RHSA-2012-1186.html http://rhn.redhat.com/errata/RHSA-2012-1187.html http://secunia.com/advisories/50344 http://www.securityfocus.com/bid/55140 https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3 https://github.com/Katello/katello/pull/499 https://access.redhat.com/security/cve/CVE-2012-3503 https://bugzilla.redhat.com/show_bug.cgi?id=849210 • CWE-798: Use of Hard-coded Credentials •