QID 238742

Date Published: 2021-11-03

QID 238742: Red Hat Update for Satellite 6.8 release (RHSA-2020:4366)

Red Hat Satellite is a systems management tool for Linux-basedinfrastructure. It allows for provisioning, remote management, andmonitoring of multiple Linux deployments with a single centralized tool.

Security Fix(es): mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018)
(CVE-2018-3258)
netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser (CVE-2020-7663)
puppet: puppet server and puppetDB may leak sensitive information via metrics API (CVE-2020-7943)
jackson-databind: multiple serialization gadgets (CVE-2020-8840 CVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10968 CVE-2020-10969 CVE-2020-11619 CVE-2020-14061 CVE-2020-14062 CVE-2020-14195)
foreman: unauthorized cache read on RPM-based installations through local user (CVE-2020-14334)
Satellite: Local user impersonation by Single sign-on (SSO)
user leads to account takeover (CVE-2020-14380)
Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS (CVE-2019-12781)
rubygem-rack: hijack sessions by using timing attacks targeting the session id (CVE-2019-16782)
rubygem-secure_headers: limited header injection when using dynamic overrides with user input (CVE-2020-5216)
rubygem-secure_headers: directive injection when using dynamic overrides with user input (CVE-2020-5217)
rubygem-actionview: views that use the `j` or `escape_javascript` methods are susceptible to XSS attacks (CVE-2020-5267)
puppet: Arbitrary catalog retrieval (CVE-2020-7942)
rubygem-rack: directory traversal in Rack::Directory (CVE-2020-8161)
rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names (CVE-2020-8184)
hibernate-validator: Improper input validation in the interpolation of constraint error messages (CVE-2020-10693)
puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL (CVE-2018-11751)

Affected Products:

Red Hat Satellite 6.8 x86_64
Red Hat Satellite Capsule 6.8 x86_64

On successful exploitation it could allow an attacker to execute code.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2020:4366 to address this issue and obtain more information.

    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2020:4366 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2020:4366