RHEL 7 / 8 : OpenShift Container Platform 4.6.17 (RHSA-2021:0423)

high Nessus Plugin ID 146566

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 / 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:0423 advisory.

- ant: insecure temporary file (CVE-2020-11979)

- ant: insecure temporary file vulnerability (CVE-2020-1945)

- jenkins: Arbitrary file read vulnerability in workspace browsers (CVE-2021-21602)

- jenkins: XSS vulnerability in notification bar (CVE-2021-21603)

- jenkins: Improper handling of REST API XML deserialization errors (CVE-2021-21604)

- jenkins: Path traversal vulnerability in agent names (CVE-2021-21605)

- jenkins: Arbitrary file existence check in file fingerprints (CVE-2021-21606)

- jenkins: Excessive memory allocation in graph URLs leads to denial of service (CVE-2021-21607)

- jenkins: Stored XSS vulnerability in button labels (CVE-2021-21608)

- jenkins: Missing permission check for paths with specific prefix (CVE-2021-21609)

- jenkins: Reflected XSS vulnerability in markup formatter preview (CVE-2021-21610)

- jenkins: Stored XSS vulnerability on new item page (CVE-2021-21611)

- jenkins: Filesystem traversal by privileged users (CVE-2021-21615)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/CVE-2020-1945

https://access.redhat.com/security/cve/CVE-2020-11979

https://access.redhat.com/security/cve/CVE-2021-21602

https://access.redhat.com/security/cve/CVE-2021-21603

https://access.redhat.com/security/cve/CVE-2021-21604

https://access.redhat.com/security/cve/CVE-2021-21605

https://access.redhat.com/security/cve/CVE-2021-21606

https://access.redhat.com/security/cve/CVE-2021-21607

https://access.redhat.com/security/cve/CVE-2021-21608

https://access.redhat.com/security/cve/CVE-2021-21609

https://access.redhat.com/security/cve/CVE-2021-21610

https://access.redhat.com/security/cve/CVE-2021-21611

https://access.redhat.com/security/cve/CVE-2021-21615

https://access.redhat.com/errata/RHSA-2021:0423

https://bugzilla.redhat.com/1837444

https://bugzilla.redhat.com/1903702

https://bugzilla.redhat.com/1921322

https://bugzilla.redhat.com/1925140

https://bugzilla.redhat.com/1925141

https://bugzilla.redhat.com/1925143

https://bugzilla.redhat.com/1925145

https://bugzilla.redhat.com/1925151

https://bugzilla.redhat.com/1925156

https://bugzilla.redhat.com/1925157

https://bugzilla.redhat.com/1925159

https://bugzilla.redhat.com/1925160

https://bugzilla.redhat.com/1925161

Plugin Details

Severity: High

ID: 146566

File Name: redhat-RHSA-2021-0423.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2/18/2021

Updated: 10/27/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2021-21605

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openshift-hyperkube, p-cpe:/a:redhat:enterprise_linux:openshift-kuryr-cni, p-cpe:/a:redhat:enterprise_linux:openshift-kuryr-common, p-cpe:/a:redhat:enterprise_linux:openshift-kuryr-controller, p-cpe:/a:redhat:enterprise_linux:python3-kuryr-kubernetes, p-cpe:/a:redhat:enterprise_linux:python3-rsa, p-cpe:/a:redhat:enterprise_linux:runc, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-idler, p-cpe:/a:redhat:enterprise_linux:cri-o, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:jenkins-2-plugins, p-cpe:/a:redhat:enterprise_linux:openshift-ansible, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-test, p-cpe:/a:redhat:enterprise_linux:openshift-clients, p-cpe:/a:redhat:enterprise_linux:openshift-clients-redistributable

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/17/2021

Vulnerability Publication Date: 5/14/2020

Reference Information

CVE: CVE-2020-11979, CVE-2020-1945, CVE-2021-21602, CVE-2021-21603, CVE-2021-21604, CVE-2021-21605, CVE-2021-21606, CVE-2021-21607, CVE-2021-21608, CVE-2021-21609, CVE-2021-21610, CVE-2021-21611, CVE-2021-21615

CWE: 20, 22, 377, 502, 59, 770, 79, 863

IAVA: 2021-A-0039-S

RHSA: 2021:0423