CVE-2012-3503

The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.
Configurations

Configuration 1 (hide)

cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:41

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2012-1186.html - Broken Link, Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1186.html - Broken Link, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-1187.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1187.html - Third Party Advisory
References () http://secunia.com/advisories/50344 - Broken Link () http://secunia.com/advisories/50344 - Broken Link
References () http://www.securityfocus.com/bid/55140 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/55140 - Broken Link, Third Party Advisory, VDB Entry
References () https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3 - Patch () https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3 - Patch
References () https://github.com/Katello/katello/pull/499 - Issue Tracking () https://github.com/Katello/katello/pull/499 - Issue Tracking

13 Feb 2024, 16:44

Type Values Removed Values Added
CPE cpe:2.3:a:katello:katello:*:*:*:*:*:*:*:* cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
CWE CWE-264 CWE-798
CVSS v2 : 6.5
v3 : unknown
v2 : 6.5
v3 : 9.8
First Time Redhat
Theforeman
Theforeman katello
Redhat enterprise Linux Server
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1186.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1186.html - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/50344 - (SECUNIA) http://secunia.com/advisories/50344 - Broken Link
References (CONFIRM) https://github.com/Katello/katello/pull/499 - (CONFIRM) https://github.com/Katello/katello/pull/499 - Issue Tracking
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1187.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1187.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/55140 - (BID) http://www.securityfocus.com/bid/55140 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3 - Exploit, Patch (CONFIRM) https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3 - Patch

Information

Published : 2012-08-25 10:29

Updated : 2024-11-21 01:41


NVD link : CVE-2012-3503

Mitre link : CVE-2012-3503

CVE.ORG link : CVE-2012-3503


JSON object : View

Products Affected

theforeman

  • katello

redhat

  • enterprise_linux_server
CWE
CWE-798

Use of Hard-coded Credentials