Vulnerabilities > CVE-2013-4480 - Exposure of Resource to Wrong Sphere vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Red Hat Satellite 5.6 and earlier does not disable the web interface that is used to create the first user for a satellite, which allows remote attackers to create administrator accounts.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-1513.NASL
    descriptionAn updated rhn-java-sat package that fixes a security issue is now available for Red Hat Network Satellite 5.2. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Red Hat Network Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and remote management of multiple Linux deployments with a single, centralized tool. The rhn-java-sat packages contain the code for the Java version of the Red Hat Network Satellite Website. It was found that the web interface provided by Red Hat Network Satellite to create the initial administrator user was not disabled after the initial user was created. A remote attacker could use this flaw to create an administrator user with credentials they specify. This user could then be used to assume control of the Satellite server. (CVE-2013-4480) This issue was discovered by Andrew Spurrier of Red Hat. All rhn-java-sat users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id70870
    published2013-11-13
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70870
    titleRHEL 5 : rhn-java-sat in Satellite Server (RHSA-2013:1513)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-1514.NASL
    descriptionUpdated spacewalk-java packages that fix one security issue are now available for Red Hat Satellite 5.3, 5.4, 5.5 and 5.6. The Red Hat Security Response Team has rated this update as having a critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Red Hat Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and remote management of multiple Linux deployments with a single, centralized tool. The spacewalk-java packages contain the code for the Java version of the Spacewalk Website. It was found that the web interface provided by Red Hat Satellite to create the initial administrator user was not disabled after the initial user was created. A remote attacker could use this flaw to create an administrator user with credentials they specify. This user could then be used to assume control of the Satellite server. (CVE-2013-4480) This issue was discovered by Andrew Spurrier of Red Hat. All spacewalk-java users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id70871
    published2013-11-13
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70871
    titleRHEL 5 / 6 : spacewalk-java in Satellite Server (RHSA-2013:1514)

Redhat

advisories
  • rhsa
    idRHSA-2013:1513
  • rhsa
    idRHSA-2013:1514
rpms
  • rhn-java-config-sat-0:5.2.1-9.el5
  • rhn-java-lib-sat-0:5.2.1-9.el5
  • rhn-java-sat-0:5.2.1-9.el5
  • taskomatic-sat-0:5.2.1-9.el5
  • spacewalk-java-0:0.5.44-97.el5sat
  • spacewalk-java-0:1.2.39-135.el5sat
  • spacewalk-java-0:1.2.39-135.el6sat
  • spacewalk-java-0:1.7.54-121.el5sat
  • spacewalk-java-0:1.7.54-121.el6sat
  • spacewalk-java-0:2.0.2-48.el5sat
  • spacewalk-java-0:2.0.2-48.el6sat
  • spacewalk-java-config-0:0.5.44-97.el5sat
  • spacewalk-java-config-0:1.2.39-135.el5sat
  • spacewalk-java-config-0:1.2.39-135.el6sat
  • spacewalk-java-config-0:1.7.54-121.el5sat
  • spacewalk-java-config-0:1.7.54-121.el6sat
  • spacewalk-java-config-0:2.0.2-48.el5sat
  • spacewalk-java-config-0:2.0.2-48.el6sat
  • spacewalk-java-lib-0:0.5.44-97.el5sat
  • spacewalk-java-lib-0:1.2.39-135.el5sat
  • spacewalk-java-lib-0:1.2.39-135.el6sat
  • spacewalk-java-lib-0:1.7.54-121.el5sat
  • spacewalk-java-lib-0:1.7.54-121.el6sat
  • spacewalk-java-lib-0:2.0.2-48.el5sat
  • spacewalk-java-lib-0:2.0.2-48.el6sat
  • spacewalk-java-oracle-0:1.2.39-135.el5sat
  • spacewalk-java-oracle-0:1.2.39-135.el6sat
  • spacewalk-java-oracle-0:1.7.54-121.el5sat
  • spacewalk-java-oracle-0:1.7.54-121.el6sat
  • spacewalk-java-oracle-0:2.0.2-48.el5sat
  • spacewalk-java-oracle-0:2.0.2-48.el6sat
  • spacewalk-java-postgresql-0:2.0.2-48.el5sat
  • spacewalk-java-postgresql-0:2.0.2-48.el6sat
  • spacewalk-taskomatic-0:0.5.44-97.el5sat
  • spacewalk-taskomatic-0:1.2.39-135.el5sat
  • spacewalk-taskomatic-0:1.2.39-135.el6sat
  • spacewalk-taskomatic-0:1.7.54-121.el5sat
  • spacewalk-taskomatic-0:1.7.54-121.el6sat
  • spacewalk-taskomatic-0:2.0.2-48.el5sat
  • spacewalk-taskomatic-0:2.0.2-48.el6sat