CVE-2009-0588
Summary
| CVE | CVE-2009-0588 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-05-27 16:30:00 UTC |
| Updated | 2009-06-09 05:32:00 UTC |
| Description | agent/request/op.cgi in the Registration Authority (RA) component in Red Hat Certificate System (RHCS) 7.3 and Dogtag Certificate System allows remote authenticated users to approve certificate requests queued for arbitrary agent groups via a modified request ID field. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Certificate System | 7.3 | All | All | All |
| Application | Redhat | Certificate System | 7.3 | All | All | All |
| Application | Redhat | Dogtag Certificate System | All | All | All | All |
| Application | Redhat | Dogtag Certificate System | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 484828 – op.cgi security bug allows RA agents to approve requests not assigned to their agent group | CONFIRM | bugzilla.redhat.com | Patch |
| Red Hat update for rhpki-ra - Secunia.com | SECUNIA | secunia.com | |
| 488706 – (CVE-2009-0588) CVE-2009-0588 rhpki-ra: improper authorization checks in Cerificate System's Registration Authority | CONFIRM | bugzilla.redhat.com | |
| Dogtag Certificate System Agent Group Security Bypass - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| Support | Red Hat | REDHAT | www.redhat.com | Patch, Vendor Advisory |
| Red Hat Certificate System Bug in Registration Authority Lets Remote Authenticated Users Bypass Access Controls - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Red Hat Certificate System 'agent/request/op.cgi' Security Bypass Vulnerability | BID | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.