Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2019-3845: Important: Red Hat Satellite Tools security update (CESA-2019:1223)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2019-3845: Important: Red Hat Satellite Tools security update (CESA-2019:1223)

Severity
5
CVSS
(AV:A/AC:L/Au:S/C:P/I:P/A:P)
Published
04/11/2019
Created
08/29/2019
Added
08/28/2019
Modified
05/25/2023

Description

A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.

Solution(s)

  • centos-upgrade-foreman-cli
  • centos-upgrade-gofer
  • centos-upgrade-katello-agent
  • centos-upgrade-katello-host-tools
  • centos-upgrade-katello-host-tools-fact-plugin
  • centos-upgrade-katello-host-tools-tracer
  • centos-upgrade-pulp-puppet-tools
  • centos-upgrade-pulp-rpm-handlers
  • centos-upgrade-puppet-agent
  • centos-upgrade-python-argcomplete
  • centos-upgrade-python-gofer
  • centos-upgrade-python-gofer-proton
  • centos-upgrade-python-hashlib
  • centos-upgrade-python-hashlib-debuginfo
  • centos-upgrade-python-isodate
  • centos-upgrade-python-psutil
  • centos-upgrade-python-psutil-debuginfo
  • centos-upgrade-python-psutil-debugsource
  • centos-upgrade-python-pulp-agent-lib
  • centos-upgrade-python-pulp-common
  • centos-upgrade-python-pulp-manifest
  • centos-upgrade-python-pulp-puppet-common
  • centos-upgrade-python-pulp-rpm-common
  • centos-upgrade-python-qpid-proton
  • centos-upgrade-python-uuid
  • centos-upgrade-python2-beautifulsoup4
  • centos-upgrade-python2-future
  • centos-upgrade-python2-tracer
  • centos-upgrade-python3-beautifulsoup4
  • centos-upgrade-python3-future
  • centos-upgrade-python3-gofer
  • centos-upgrade-python3-gofer-proton
  • centos-upgrade-python3-psutil
  • centos-upgrade-python3-psutil-debuginfo
  • centos-upgrade-python3-qpid-proton
  • centos-upgrade-python3-qpid-proton-debuginfo
  • centos-upgrade-python3-tracer
  • centos-upgrade-qpid-proton-c
  • centos-upgrade-qpid-proton-c-debuginfo
  • centos-upgrade-qpid-proton-cpp-debuginfo
  • centos-upgrade-qpid-proton-debuginfo
  • centos-upgrade-qpid-proton-debugsource
  • centos-upgrade-rubygem-foreman_scap_client
  • centos-upgrade-rubygem-json
  • centos-upgrade-rubygem-json-debuginfo
  • centos-upgrade-satellite
  • centos-upgrade-satellite-branding
  • centos-upgrade-satellite-cli
  • centos-upgrade-tfm-ror52-rubygem-mime-types
  • centos-upgrade-tfm-ror52-rubygem-mime-types-data
  • centos-upgrade-tfm-ror52-rubygem-multi_json
  • centos-upgrade-tfm-ror52-runtime
  • centos-upgrade-tfm-rubygem-apipie-bindings
  • centos-upgrade-tfm-rubygem-awesome_print
  • centos-upgrade-tfm-rubygem-clamp
  • centos-upgrade-tfm-rubygem-domain_name
  • centos-upgrade-tfm-rubygem-fast_gettext
  • centos-upgrade-tfm-rubygem-hammer_cli
  • centos-upgrade-tfm-rubygem-hammer_cli_csv
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_admin
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_ansible
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_bootdisk
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_discovery
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_docker
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_openscap
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_remote_execution
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_tasks
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_templates
  • centos-upgrade-tfm-rubygem-hammer_cli_foreman_virt_who_configure
  • centos-upgrade-tfm-rubygem-hammer_cli_katello
  • centos-upgrade-tfm-rubygem-hashie
  • centos-upgrade-tfm-rubygem-highline
  • centos-upgrade-tfm-rubygem-http-cookie
  • centos-upgrade-tfm-rubygem-little-plugger
  • centos-upgrade-tfm-rubygem-locale
  • centos-upgrade-tfm-rubygem-logging
  • centos-upgrade-tfm-rubygem-netrc
  • centos-upgrade-tfm-rubygem-oauth
  • centos-upgrade-tfm-rubygem-powerbar
  • centos-upgrade-tfm-rubygem-rest-client
  • centos-upgrade-tfm-rubygem-unf
  • centos-upgrade-tfm-rubygem-unf_ext
  • centos-upgrade-tfm-rubygem-unf_ext-debuginfo
  • centos-upgrade-tfm-rubygem-unicode
  • centos-upgrade-tfm-rubygem-unicode-debuginfo
  • centos-upgrade-tfm-rubygem-unicode-display_width
  • centos-upgrade-tfm-runtime
  • centos-upgrade-tracer-common

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;