RHEL 6 : Red Hat OpenShift Enterprise 2.2.7 (RHSA-2015:1844)

high Nessus Plugin ID 119363

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2015:1844 advisory.

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

Space precludes documenting all of the bug fixes in this advisory.
See the OpenShift Enterprise Technical Notes, which will be updated shortly for release 2.2.7, for details about these changes. The following security issues are addressed in this release:

A flaw was found in the Jenkins API token-issuing service. The service was not properly protected against anonymous users, potentially allowing remote attackers to escalate privileges.
(CVE-2015-1814)

It was found that the combination filter Groovy script could allow a remote attacker to potentially execute arbitrary code on a Jenkins master. (CVE-2015-1806)

It was found that when building artifacts, the Jenkins server would follow symbolic links, potentially resulting in disclosure of information on the server. (CVE-2015-1807)

A denial of service flaw was found in the way Jenkins handled certain update center data. An authenticated user could provide specially crafted update center data to Jenkins, causing plug-in and tool installation to not work properly. (CVE-2015-1808)

It was found that Jenkins' XPath handling allowed XML External Entity (XXE) expansion. A remote attacker with read access could use this flaw to read arbitrary XML files on the Jenkins server.
(CVE-2015-1809)

It was discovered that the internal Jenkins user database did not restrict access to reserved names, allowing users to escalate privileges. (CVE-2015-1810)

It was found that Jenkins' XML handling allowed XML External Entity (XXE) expansion. A remote attacker with the ability to pass XML data to Jenkins could use this flaw to read arbitrary XML files on the Jenkins server. (CVE-2015-1811)

Two cross-site scripting (XSS) flaws were found in Jenkins. A remote attacker could use these flaws to conduct XSS attacks against users of an application using Jenkins. (CVE-2015-1812, CVE-2015-1813)

https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html- single/Technical_Notes/index.html All OpenShift Enterprise 2 users are advised to upgrade to these updated packages.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?be0cafb9

https://access.redhat.com/errata/RHSA-2015:1844

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1062253

https://bugzilla.redhat.com/show_bug.cgi?id=1128567

https://bugzilla.redhat.com/show_bug.cgi?id=1130028

https://bugzilla.redhat.com/show_bug.cgi?id=1138522

https://bugzilla.redhat.com/show_bug.cgi?id=1152524

https://bugzilla.redhat.com/show_bug.cgi?id=1160699

https://bugzilla.redhat.com/show_bug.cgi?id=1171815

https://bugzilla.redhat.com/show_bug.cgi?id=1191283

https://bugzilla.redhat.com/show_bug.cgi?id=1197123

https://bugzilla.redhat.com/show_bug.cgi?id=1197576

https://bugzilla.redhat.com/show_bug.cgi?id=1205615

https://bugzilla.redhat.com/show_bug.cgi?id=1205616

https://bugzilla.redhat.com/show_bug.cgi?id=1205620

https://bugzilla.redhat.com/show_bug.cgi?id=1205622

https://bugzilla.redhat.com/show_bug.cgi?id=1205623

https://bugzilla.redhat.com/show_bug.cgi?id=1205625

https://bugzilla.redhat.com/show_bug.cgi?id=1205627

https://bugzilla.redhat.com/show_bug.cgi?id=1205632

https://bugzilla.redhat.com/show_bug.cgi?id=1216206

https://bugzilla.redhat.com/show_bug.cgi?id=1217572

https://bugzilla.redhat.com/show_bug.cgi?id=1221931

https://bugzilla.redhat.com/show_bug.cgi?id=1225943

https://bugzilla.redhat.com/show_bug.cgi?id=1226061

https://bugzilla.redhat.com/show_bug.cgi?id=1227501

https://bugzilla.redhat.com/show_bug.cgi?id=1228373

https://bugzilla.redhat.com/show_bug.cgi?id=1229300

https://bugzilla.redhat.com/show_bug.cgi?id=1232827

https://bugzilla.redhat.com/show_bug.cgi?id=1232921

https://bugzilla.redhat.com/show_bug.cgi?id=1241750

https://bugzilla.redhat.com/show_bug.cgi?id=1257757

https://bugzilla.redhat.com/show_bug.cgi?id=1264039

https://bugzilla.redhat.com/show_bug.cgi?id=1264210

https://bugzilla.redhat.com/show_bug.cgi?id=1264216

Plugin Details

Severity: High

ID: 119363

File Name: redhat-RHSA-2015-1844.nasl

Version: 1.9

Type: local

Agent: unix

Published: 12/4/2018

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-1814

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2015-1811

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-perl, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-mock, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jenkins, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-console, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-gear-placement, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-msg-broker-mcollective, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-nodejs, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-routing-daemon, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-haproxy, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-apache-vhost, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-python, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-php, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbosseap, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-ruby, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-logshifter, p-cpe:/a:redhat:enterprise_linux:rhc, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-diy, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbossews

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/30/2015

Vulnerability Publication Date: 10/16/2015

Reference Information

CVE: CVE-2015-1806, CVE-2015-1807, CVE-2015-1808, CVE-2015-1809, CVE-2015-1810, CVE-2015-1811, CVE-2015-1812, CVE-2015-1813, CVE-2015-1814

CWE: 20, 284, 59, 611, 79

RHSA: 2015:1844