RHEL 6 : openshift-origin-broker (RHSA-2014:0422)

High Nessus Plugin ID 119348

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated openshift-origin-broker and rubygem-openshift-origin-auth-remote-user packages that fix one security issue are now available for Red Hat OpenShift Enterprise 1.2.7.

The Red Hat Security Response Team has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The openshift-origin-broker package provides the OpenShift Broker service that manages all user logins, DNS name resolution, application states, and general orchestration of the applications.

The rubygem-openshift-origin-auth-remote-user package provides the remote user authentication plug-in.

A flaw was found in the way openshift-origin-broker handled authentication requests via the remote user authentication plug-in. A remote attacker able to submit a request to openshift-origin-broker could set the X-Remote-User header, and send the request to a passthrough trigger, resulting in a bypass of the authentication checks to gain access to any OpenShift user account on the system.
(CVE-2014-0188)

All users of Red Hat OpenShift Enterprise 1.2.7 are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, restart the httpd daemon for this update to take effect.

Solution

Update the affected openshift-origin-broker and / or rubygem-openshift-origin-auth-remote-user packages.

See Also

https://access.redhat.com/errata/RHSA-2014:0422

https://access.redhat.com/security/cve/cve-2014-0188

Plugin Details

Severity: High

ID: 119348

File Name: redhat-RHSA-2014-0422.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2018/12/04

Modified: 2018/12/04

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-auth-remote-user, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/04/23

Reference Information

CVE: CVE-2014-0188

BID: 67037

RHSA: 2014:0422