RHEL 6 : rubygem-openshift-origin-console (RHSA-2015:1808)

Medium Nessus Plugin ID 119362


The remote Red Hat host is missing a security update.


Updated rubygem-openshift-origin-console packages that fix one security issue are now available for Red Hat OpenShift Enterprise 2.2.

Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the references section.

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

A command injection flaw was found in the rubygem-openshift-origin- console. A remote, authenticated user permitted to send requests to the Broker could execute arbitrary commands with elevated privileges on the Red Hat OpenShift server. (CVE-2015-5274)

All rubygem-openshift-origin-console users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.


Update the affected rubygem-openshift-origin-console package.

See Also




Plugin Details

Severity: Medium

ID: 119362

File Name: redhat-RHSA-2015-1808.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2018/12/04

Updated: 2018/12/20

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-console, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2015/09/16

Reference Information

CVE: CVE-2015-5274

RHSA: 2015:1808