CVE-2009-4139 – Spacewalk: CSRF in all web portal forms
https://notcve.org/view.php?id=CVE-2009-4139
Cross-site request forgery (CSRF) vulnerability in the Spacewalk Java site packages (aka spacewalk-java) 1.2.39 in Spacewalk, as used in the server in Red Hat Network Satellite 5.3.0 through 5.4.1 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that (1) disable the current user account, (2) add user accounts, or (3) modify user accounts to have administrator privileges. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en los paquetes Spacewalk Java (spacewalk-java) 1.2.39 de Spacewalk, tal como se utiliza en el servidor de Red Hat Network Satellite 5.3.0 hasta la versión 5.4.1 y otros productos, permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios para peticiones que (1) deshabilitan la cuenta del usuario actual, (2) añaden cuentas de usuarios, o (3) modifican cuentas de usuarios para tener privilegios administrativos. • http://securitytracker.com/id?1025674 http://www.redhat.com/support/errata/RHSA-2011-0879.html https://bugzilla.redhat.com/show_bug.cgi?id=529483 https://exchange.xforce.ibmcloud.com/vulnerabilities/68074 https://access.redhat.com/security/cve/CVE-2009-4139 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2009-0788 – rhn_satellite: Incorrect mod_rewrite rules (information disclosure, abuse as distributed DoS tool)
https://notcve.org/view.php?id=CVE-2009-0788
Red Hat Network (RHN) Satellite Server 5.3 and 5.4 does not properly rewrite unspecified URLs, which allows remote attackers to (1) obtain unspecified sensitive host information or (2) use the server as an inadvertent proxy to connect to arbitrary services and IP addresses via unspecified vectors. Red Hat Network (RHN) Satellite Server 5.3 y 5.4 no reescribe correctamente URLs no especificadas, lo que permite a atacantes remotos (1) obtener información sensible no especificado del anfitrión o (2) utilizar el servidor como un proxy inadvertido para conectar con servicios y direcciones IP arbitrarios a través de vectores no especificados. • http://secunia.com/advisories/44150 http://www.redhat.com/support/errata/RHSA-2011-0434.html http://www.securityfocus.com/bid/47316 http://www.securitytracker.com/id?1025316 http://www.vupen.com/english/advisories/2011/0967 https://bugzilla.redhat.com/show_bug.cgi?id=491365 https://exchange.xforce.ibmcloud.com/vulnerabilities/66691 https://access.redhat.com/security/cve/CVE-2009-0788 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2010-1171 – rhn_satellite: Improper channel comps information management
https://notcve.org/view.php?id=CVE-2010-1171
Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels. Vulnerabilidad de redirección abierta en el obsoleto API de XML-RPC en Red Hat Network (RHN) Satellite v5.3 y v5.4, que permite a usuarios remotos autenticados acceder a archivos arbitrarios y causar una denegación de servicio (operaciones fallida de YUM) a través de vectores relacionados con la de configuración y el paquete (comps.xml )de archivos de los canales. • http://secunia.com/advisories/44150 http://www.redhat.com/support/errata/RHSA-2011-0434.html http://www.securityfocus.com/bid/47316 http://www.securitytracker.com/id?1025316 http://www.vupen.com/english/advisories/2011/0967 https://bugzilla.redhat.com/show_bug.cgi?id=584118 https://exchange.xforce.ibmcloud.com/vulnerabilities/66690 https://access.redhat.com/security/cve/CVE-2010-1171 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-0717 – Spacewalk: Session fixation flaw
https://notcve.org/view.php?id=CVE-2011-0717
Session fixation vulnerability in Red Hat Network (RHN) Satellite Server 5.4 allows remote attackers to hijack web sessions via unspecified vectors related to Spacewalk. Vulnerabilidad de fijación de sesión en Red Hat Network (RHN) Satellite Server v5.4 permite a atacantes remotos secuestrar sesiones web a través de vectores no especificados relacionados con Spacewalk • http://secunia.com/advisories/43487 http://www.redhat.com/support/errata/RHSA-2011-0300.html http://www.securityfocus.com/bid/46528 http://www.securitytracker.com/id?1025116 http://www.vupen.com/english/advisories/2011/0491 https://bugzilla.redhat.com/show_bug.cgi?id=672159 https://exchange.xforce.ibmcloud.com/vulnerabilities/65658 https://access.redhat.com/security/cve/CVE-2011-0717 • CWE-384: Session Fixation •
CVE-2011-0718 – Spacewalk: Prone to brute force password guessing attacks
https://notcve.org/view.php?id=CVE-2011-0718
Red Hat Network (RHN) Satellite Server 5.4 does not use a time delay after a failed login attempt, which makes it easier for remote attackers to conduct brute force password guessing attacks. Red Hat Network (RHN) Satellite Server v5.4 no utiliza un intervalo de tiempo después de un intento de login fallido, lo que facilita a los atacantes remotos realizar ataques de contraseña por fuerza bruta. • http://secunia.com/advisories/43487 http://www.redhat.com/support/errata/RHSA-2011-0300.html http://www.securityfocus.com/bid/46528 http://www.securitytracker.com/id?1025116 http://www.vupen.com/english/advisories/2011/0491 https://bugzilla.redhat.com/show_bug.cgi?id=672159 https://exchange.xforce.ibmcloud.com/vulnerabilities/65657 https://access.redhat.com/security/cve/CVE-2011-0718 https://bugzilla.redhat.com/show_bug.cgi?id=672163 • CWE-287: Improper Authentication •