RHEL 6 : katello-configure (RHSA-2014:1186)

Medium Nessus Plugin ID 77661


The remote Red Hat host is missing a security update.


An updated katello-configure package that fixes one security issue is now available for Red Hat Subscription Asset Manager.

Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The katello-configure package provides the katello-configure script, which configures the Katello installation, and the katello-upgrade script, which handles upgrades between versions.

It was discovered that the default configuration of Elasticsearch enabled dynamic scripting, allowing a remote attacker to execute arbitrary MVEL expressions and Java code via the source parameter passed to _search. (CVE-2014-3120)

All Subscription Asset Manager users are advised to upgrade to this updated package. The update provides a script that modifies the elasticsearch.yml configuration file to disable dynamic scripting.
After updating, run the 'katello-configure' command. This will update the elasticsearch.yml configuration file and restart the elasticsearch service.


Update the affected katello-configure package.

See Also



Plugin Details

Severity: Medium

ID: 77661

File Name: redhat-RHSA-2014-1186.nasl

Version: $Revision: 1.8 $

Type: local

Agent: unix

Published: 2014/09/12

Modified: 2017/01/06

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:TF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:katello-configure, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/09/11

Exploitable With

Metasploit (ElasticSearch Dynamic Script Arbitrary Java Execution)

Reference Information

CVE: CVE-2014-3120

BID: 67731

OSVDB: 106949

RHSA: 2014:1186