RHCOS 2 : Red Hat OpenShift Enterprise 2.2.7 (RHSA-2015:1844)

medium Nessus Plugin ID 312004

Synopsis

The remote Red Hat CoreOS host is missing one or more security updates.

Description

The remote Red Hat Enterprise Linux CoreOS 2 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2015:1844 advisory.

- jenkins: Combination filter Groovy script unsecured (SECURITY-125) (CVE-2015-1806)

- jenkins: directory traversal from artifacts via symlink (SECURITY-162) (CVE-2015-1807)

- jenkins: update center metadata retrieval DoS attack (SECURITY-163) (CVE-2015-1808)

- jenkins: external entity injection via XPath (SECURITY-165) (CVE-2015-1809)

- jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) (CVE-2015-1810)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1062253

https://bugzilla.redhat.com/show_bug.cgi?id=1128567

https://bugzilla.redhat.com/show_bug.cgi?id=1130028

https://bugzilla.redhat.com/show_bug.cgi?id=1138522

https://bugzilla.redhat.com/show_bug.cgi?id=1152524

https://bugzilla.redhat.com/show_bug.cgi?id=1160699

https://bugzilla.redhat.com/show_bug.cgi?id=1171815

https://bugzilla.redhat.com/show_bug.cgi?id=1191283

https://bugzilla.redhat.com/show_bug.cgi?id=1197123

https://bugzilla.redhat.com/show_bug.cgi?id=1197576

https://bugzilla.redhat.com/show_bug.cgi?id=1205615

https://bugzilla.redhat.com/show_bug.cgi?id=1205616

https://bugzilla.redhat.com/show_bug.cgi?id=1205620

https://bugzilla.redhat.com/show_bug.cgi?id=1205622

https://bugzilla.redhat.com/show_bug.cgi?id=1205623

https://bugzilla.redhat.com/show_bug.cgi?id=1205625

https://bugzilla.redhat.com/show_bug.cgi?id=1205627

https://bugzilla.redhat.com/show_bug.cgi?id=1205632

https://bugzilla.redhat.com/show_bug.cgi?id=1216206

https://bugzilla.redhat.com/show_bug.cgi?id=1217572

https://bugzilla.redhat.com/show_bug.cgi?id=1221931

https://bugzilla.redhat.com/show_bug.cgi?id=1225943

https://bugzilla.redhat.com/show_bug.cgi?id=1226061

https://bugzilla.redhat.com/show_bug.cgi?id=1227501

https://bugzilla.redhat.com/show_bug.cgi?id=1228373

https://bugzilla.redhat.com/show_bug.cgi?id=1229300

https://bugzilla.redhat.com/show_bug.cgi?id=1232827

https://bugzilla.redhat.com/show_bug.cgi?id=1232921

https://bugzilla.redhat.com/show_bug.cgi?id=1241750

https://bugzilla.redhat.com/show_bug.cgi?id=1257757

https://bugzilla.redhat.com/show_bug.cgi?id=1264039

https://bugzilla.redhat.com/show_bug.cgi?id=1264210

https://bugzilla.redhat.com/show_bug.cgi?id=1264216

http://www.nessus.org/u?d824e348

https://access.redhat.com/errata/RHSA-2015:1844

Plugin Details

Severity: Medium

ID: 312004

File Name: rhcos-RHSA-2015-1844.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/4/2026

Updated: 5/4/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-1814

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2015-1811

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Threat Score: 2.7

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-console, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jenkins, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-apache-vhost, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-routing-daemon, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbosseap, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-gear-placement, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-nodejs, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbossews, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-mock, p-cpe:/a:redhat:enterprise_linux:rhc, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-haproxy, p-cpe:/a:redhat:enterprise_linux:openshift-origin-logshifter, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-python, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-diy, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-perl, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-php, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-ruby, cpe:/o:redhat:enterprise_linux:6:coreos, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-msg-broker-mcollective

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/30/2015

Vulnerability Publication Date: 3/23/2015

Reference Information

CVE: CVE-2015-1806, CVE-2015-1807, CVE-2015-1808, CVE-2015-1809, CVE-2015-1810, CVE-2015-1811, CVE-2015-1812, CVE-2015-1813, CVE-2015-1814

CWE: 20, 284, 59, 611, 79

RHSA: 2015:1844