Skip to content

Commit d44170a

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@9920c49
1 parent e1d8ce3 commit d44170a

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2012-3503 (katello): Katello uses hard coded credential'
4+
comments: false
5+
categories:
6+
- katello
7+
advisory:
8+
gem: katello
9+
cve: 2012-3503
10+
ghsa: 5xv2-q475-rwrh
11+
url: https://github.com/advisories/GHSA-5xv2-q475-rwrh
12+
title: Katello uses hard coded credential
13+
date: 2022-05-17
14+
description: |
15+
The installation script in Katello 1.0 and earlier does not properly
16+
generate the `Application.config.secret_token` value, which causes
17+
each default installation to have the same secret token, and allows
18+
remote attackers to authenticate to the CloudForms System Engine
19+
web interface as an arbitrary user by creating a cookie using the
20+
default `secret_token`.
21+
cvss_v2: 6.5
22+
cvss_v3: 9.8
23+
patched_versions:
24+
- "~> 1.0.6"
25+
- ">= 1.1.7"
26+
related:
27+
url:
28+
- https://nvd.nist.gov/vuln/detail/CVE-2012-3503
29+
- https://github.com/Katello/katello/pull/499
30+
- https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3
31+
- http://rhn.redhat.com/errata/RHSA-2012-1186.html
32+
- http://rhn.redhat.com/errata/RHSA-2012-1187.html
33+
- https://web.archive.org/web/20140806122239/http://secunia.com/advisories/50344
34+
- https://web.archive.org/web/20200229120740/http://www.securityfocus.com/bid/55140
35+
- https://github.com/advisories/GHSA-5xv2-q475-rwrh
36+
---

0 commit comments

Comments
 (0)