This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Red Hat Satellite 6.1 now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having an important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Red Hat Satellite is a system management solution that allows
organizations to configure and maintain their systems without the
necessity to provide public Internet access to their servers or other
client systems. It performs provisioning and configuration management
of predefined standard operating environments.
This update provides Satellite 6.1 packages for Red Hat Enterprise
Linux 6. For the full list of new features provided by Satellite 6.1
see the Release notes linked to in References section. (BZ#1201357)
It was discovered that, in Foreman, the edit_users permission (for
example, granted to the Manager role) allowed the user to edit admin
user passwords. An attacker with the edit_users permission could use
this flaw to access an admin user account, leading to an escalation of
It was found that Foreman did not set the HttpOnly flag on session
cookies. This could allow a malicious script to access the session
It was found that when making an SSL connection to an LDAP
authentication source in Foreman, the remote server certificate was
accepted without any verification against known certificate
authorities, potentially making TLS connections vulnerable to
man-in-the-middle attacks. (CVE-2015-1816)
A flaw was found in the way Foreman authorized user actions on
resources via the API when an organization was not explicitly set. A
remote attacker could use this flaw to obtain additional information
about resources they were not authorized to access. (CVE-2015-1844)
A cross-site scripting (XSS) flaw was found in Foreman's template
preview screen. A remote attacker could use this flaw to perform
cross-site scripting attacks by tricking a user into viewing a
malicious template. Note that templates are commonly shared among
It was found that python-oauth2 did not properly verify the nonce of a
signed URL. An attacker able to capture network traffic of a website
using OAuth2 authentication could use this flaw to conduct replay
attacks against that website. (CVE-2013-4346)
It was found that python-oauth2 did not properly generate random
values for use in nonces. An attacker able to capture network traffic
of a website using OAuth2 authentication could use this flaw to
conduct replay attacks against that website. (CVE-2013-4347)
Red Hat would like to thank Rufus Jarnefelt of Coresec for reporting
the Foreman HttpOnly issue.
All users who require Satellite 6.1 are advised to install these new
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.0
CVSS Temporal Score : 5.0
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 85716 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now