RHEL 8 : Satellite 6.13.1 Async Security Update (Moderate) (RHSA-2023:3387)

medium Nessus Plugin ID 194239

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 8 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2023:3387 advisory.

Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.

Security fix(es):

foreman: Stored cross-site scripting in host tab(CVE-2023-0119)

This update fixes the following bugs:

2190469 - CVE-2023-0119 foreman: Stored cross-site scripting in host tab [rhn_satellite_6.13] 2190460 - Navigating to Capsules page on Satellite WebUI displays error Pulp plugin missing for synchronizable content types: . Repositories containing these content types will not be synced. for few seconds 2190470 - Host Detail button landed to old Host UI page 2190472 - wrong metadata if uploaded rpm have different name than name in rpm 2190473 - Getting NoMethodError undefined method `get_status' for nil:NilClass when publishing content view 2190509 - Incremental update of the content view takes long time to complete 2190512 - Error importing repositories with GPG key 2190513 - Satellite showing errata from module streams not installed on client as upgradable/installable when content is imported (not synced) 2191657 - Importing Red Hat Repository Import on Disconnected Red Hat Satellite taking huge time around 5 hours 2191659 - Misleading job status in the new host UI when running jobs in bulk 2196242 - Upgrade to Satellite 6.13 fails on db:seed step with error GraphQL::InvalidNameError: Names must match /^[_a-zA-Z][_a-zA-Z0-9]*$/ but 'RHEL OpenStack Platform' does not 2208642 - Support satellite-clone with Ansible running on Python 3.11 in RHEL 8.8

Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected foreman package.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=2159104

https://bugzilla.redhat.com/show_bug.cgi?id=2190460

https://bugzilla.redhat.com/show_bug.cgi?id=2190464

https://bugzilla.redhat.com/show_bug.cgi?id=2190470

https://bugzilla.redhat.com/show_bug.cgi?id=2190472

https://bugzilla.redhat.com/show_bug.cgi?id=2190473

https://bugzilla.redhat.com/show_bug.cgi?id=2190509

https://bugzilla.redhat.com/show_bug.cgi?id=2190512

https://bugzilla.redhat.com/show_bug.cgi?id=2190513

https://bugzilla.redhat.com/show_bug.cgi?id=2191657

https://bugzilla.redhat.com/show_bug.cgi?id=2191659

https://bugzilla.redhat.com/show_bug.cgi?id=2196242

https://bugzilla.redhat.com/show_bug.cgi?id=2208642

http://www.nessus.org/u?8b479853

https://access.redhat.com/errata/RHSA-2023:3387

Plugin Details

Severity: Medium

ID: 194239

File Name: redhat-RHSA-2023-3387.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/28/2024

Updated: 6/4/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2023-0119

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:foreman, cpe:/o:redhat:enterprise_linux:8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/31/2023

Vulnerability Publication Date: 5/31/2023

Reference Information

CVE: CVE-2023-0119

CWE: 79

RHSA: 2023:3387