RHEL 5 / 6 : mod_cluster (RHSA-2012:1053)

medium Nessus Plugin ID 193679

Synopsis

The remote Red Hat host is missing a security update for mod_cluster.

Description

The remote Redhat Enterprise Linux 5 / 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2012:1053 advisory.

mod_cluster is an Apache HTTP Server (httpd) based load balancer that forwards requests from httpd to application server nodes. It can use the AJP, HTTP, or HTTPS protocols for communication with application server nodes.

The JBoss Enterprise Web Platform 5.1.2 release (RHSA-2011:1804, RHSA-2011:1803, RHSA-2011:1802) introduced a regression, causing mod_cluster to register and expose the root context of a server by default, even when ROOT was in the excludedContexts list in the mod_cluster configuration. If an application was deployed on the root context, a remote attacker could use this flaw to bypass intended access restrictions and gain access to that application. (CVE-2012-1154)

Warning: Before applying this update, back up your JBoss Enterprise Web Platform's server/[PROFILE]/deploy/ directory and any other customized configuration files.

Users of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4, 5, and 6 should upgrade to these updated packages, which correct this issue. The JBoss server process must be restarted for this update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL mod_cluster package based on the guidance in RHSA-2012:1053.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://rhn.redhat.com/errata/RHSA-2011-1804.html

https://rhn.redhat.com/errata/RHSA-2011-1803.html

https://rhn.redhat.com/errata/RHSA-2011-1802.html

https://bugzilla.redhat.com/show_bug.cgi?id=802200

http://www.nessus.org/u?95f09123

https://access.redhat.com/errata/RHSA-2012:1053

Plugin Details

Severity: Medium

ID: 193679

File Name: redhat-RHSA-2012-1053.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/21/2024

Updated: 11/4/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-1154

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mod_cluster-tomcat6, p-cpe:/a:redhat:enterprise_linux:mod_cluster-jbossweb2, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:mod_cluster, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:mod_cluster-demo, p-cpe:/a:redhat:enterprise_linux:mod_cluster-jbossas

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 7/3/2012

Vulnerability Publication Date: 6/19/2012

Reference Information

CVE: CVE-2012-1154

RHSA: 2012:1053