vulnerability

Red Hat: CVE-2019-3845: Important: Red Hat Satellite Tools security update (RHSA-2019:1223)

Severity
5
CVSS
(AV:A/AC:L/Au:S/C:P/I:P/A:P)
Published
2019-04-11
Added
2019-05-15
Modified
2021-10-19

Description

A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.

Solution(s)

redhat-upgrade-foreman-cliredhat-upgrade-goferredhat-upgrade-katello-agentredhat-upgrade-katello-host-toolsredhat-upgrade-katello-host-tools-fact-pluginredhat-upgrade-katello-host-tools-tracerredhat-upgrade-pulp-puppet-toolsredhat-upgrade-pulp-rpm-handlersredhat-upgrade-puppet-agentredhat-upgrade-python-argcompleteredhat-upgrade-python-goferredhat-upgrade-python-gofer-protonredhat-upgrade-python-hashlibredhat-upgrade-python-hashlib-debuginforedhat-upgrade-python-isodateredhat-upgrade-python-psutilredhat-upgrade-python-psutil-debuginforedhat-upgrade-python-psutil-debugsourceredhat-upgrade-python-pulp-agent-libredhat-upgrade-python-pulp-commonredhat-upgrade-python-pulp-manifestredhat-upgrade-python-pulp-puppet-commonredhat-upgrade-python-pulp-rpm-commonredhat-upgrade-python-qpid-protonredhat-upgrade-python-uuidredhat-upgrade-python2-beautifulsoup4redhat-upgrade-python2-futureredhat-upgrade-python2-tracerredhat-upgrade-python3-beautifulsoup4redhat-upgrade-python3-futureredhat-upgrade-python3-goferredhat-upgrade-python3-gofer-protonredhat-upgrade-python3-psutilredhat-upgrade-python3-psutil-debuginforedhat-upgrade-python3-qpid-protonredhat-upgrade-python3-qpid-proton-debuginforedhat-upgrade-python3-tracerredhat-upgrade-qpid-proton-credhat-upgrade-qpid-proton-c-debuginforedhat-upgrade-qpid-proton-cpp-debuginforedhat-upgrade-qpid-proton-debuginforedhat-upgrade-qpid-proton-debugsourceredhat-upgrade-rubygem-foreman_scap_clientredhat-upgrade-rubygem-jsonredhat-upgrade-rubygem-json-debuginforedhat-upgrade-satelliteredhat-upgrade-satellite-brandingredhat-upgrade-satellite-cliredhat-upgrade-tfm-ror52-rubygem-mime-typesredhat-upgrade-tfm-ror52-rubygem-mime-types-dataredhat-upgrade-tfm-ror52-rubygem-multi_jsonredhat-upgrade-tfm-ror52-runtimeredhat-upgrade-tfm-rubygem-apipie-bindingsredhat-upgrade-tfm-rubygem-awesome_printredhat-upgrade-tfm-rubygem-clampredhat-upgrade-tfm-rubygem-domain_nameredhat-upgrade-tfm-rubygem-fast_gettextredhat-upgrade-tfm-rubygem-hammer_cliredhat-upgrade-tfm-rubygem-hammer_cli_csvredhat-upgrade-tfm-rubygem-hammer_cli_foremanredhat-upgrade-tfm-rubygem-hammer_cli_foreman_adminredhat-upgrade-tfm-rubygem-hammer_cli_foreman_ansibleredhat-upgrade-tfm-rubygem-hammer_cli_foreman_bootdiskredhat-upgrade-tfm-rubygem-hammer_cli_foreman_discoveryredhat-upgrade-tfm-rubygem-hammer_cli_foreman_dockerredhat-upgrade-tfm-rubygem-hammer_cli_foreman_openscapredhat-upgrade-tfm-rubygem-hammer_cli_foreman_remote_executionredhat-upgrade-tfm-rubygem-hammer_cli_foreman_tasksredhat-upgrade-tfm-rubygem-hammer_cli_foreman_templatesredhat-upgrade-tfm-rubygem-hammer_cli_foreman_virt_who_configureredhat-upgrade-tfm-rubygem-hammer_cli_katelloredhat-upgrade-tfm-rubygem-hashieredhat-upgrade-tfm-rubygem-highlineredhat-upgrade-tfm-rubygem-http-cookieredhat-upgrade-tfm-rubygem-little-pluggerredhat-upgrade-tfm-rubygem-localeredhat-upgrade-tfm-rubygem-loggingredhat-upgrade-tfm-rubygem-netrcredhat-upgrade-tfm-rubygem-oauthredhat-upgrade-tfm-rubygem-powerbarredhat-upgrade-tfm-rubygem-rest-clientredhat-upgrade-tfm-rubygem-unfredhat-upgrade-tfm-rubygem-unf_extredhat-upgrade-tfm-rubygem-unf_ext-debuginforedhat-upgrade-tfm-rubygem-unicoderedhat-upgrade-tfm-rubygem-unicode-debuginforedhat-upgrade-tfm-rubygem-unicode-display_widthredhat-upgrade-tfm-runtimeredhat-upgrade-tracer-common
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.