RHEL 7 : CFME 5.6.3 (RHSA-2016:2839)

high Nessus Plugin ID 233050

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2016:2839 advisory.

Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.

Security Fix(es):

* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (CVE-2016-5402)

This issue was discovered by Simon Lukasik (Red Hat).

Additional Changes:

This update also fixes various bugs and adds several enhancements. Notable changes include:

Changes to the Automate component:

* This release of CloudForms allows provisioning of a virtual machine without specifying a host but validating a cluster. CloudForms now validates if either a host or cluster is selected when provisioning on VMware. (BZ#1378116)

Changes to the Providers component:

* In the previous version of CloudForms, when attempting to open a VNC console to an instance, CloudForms failed to connect because the instance did not exist for that tenant - it attempted to use the wrong tenant. This update specifies the tenant when opening a VNC console which has resolved the issue.
CloudForms is now able to connect successfully without an error. (BZ#1370207)

Changes to the Provisioning component:

* In the previous version of CloudForms, cloning a VMware template failed when the target datacenter was nested below multiple folders. This was because if the datacenter was nested logically under various folders, users were unable to find the placement ID during an autoplacement VMware provision request. This fix always does a lookup of the folder path from the host datacenter instead of statically setting a possible wrong default value which has resolved the issue. (BZ#1361174)

Changes to the Replication component:

* In the previous version of CloudForms, subscription validation failed for replication subscriptions which were successfully saved. This was because the validation was done directly by the UI which did not have access to passwords of currently saved subscriptions. The validation would pass when the user enters the password when initially saving the subscription, but failed once the subscription needed to be retrieved from the database. This update has fixed the failing validation on saved replication subscriptions. (BZ#1378554)

Changes to the vulnerability component:

* A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. (BZ#1357559)

* In the previous version of CloudForms, when trying to save filters in Subnets/Routers/Security groups/Floating IPs/Network ports exception appeared. This was caused due to missing routes for network resources. This update adds missing routes for network resources and the issue has now been resolved.
(BZ#1370573)

* In the previous version of CloudForms, My Filters in datastore was unclickable and no filters were shown under it. This update enabled My Filters in datastore and the issue is now resolved. (BZ#1379727)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1346967

https://bugzilla.redhat.com/show_bug.cgi?id=1346969

https://bugzilla.redhat.com/show_bug.cgi?id=1347002

https://bugzilla.redhat.com/show_bug.cgi?id=1349413

https://bugzilla.redhat.com/show_bug.cgi?id=1357559

https://bugzilla.redhat.com/show_bug.cgi?id=1358324

https://bugzilla.redhat.com/show_bug.cgi?id=1361174

https://bugzilla.redhat.com/show_bug.cgi?id=1362632

https://bugzilla.redhat.com/show_bug.cgi?id=1368162

https://bugzilla.redhat.com/show_bug.cgi?id=1368172

https://bugzilla.redhat.com/show_bug.cgi?id=1370207

https://bugzilla.redhat.com/show_bug.cgi?id=1370570

https://bugzilla.redhat.com/show_bug.cgi?id=1370573

https://bugzilla.redhat.com/show_bug.cgi?id=1370576

https://bugzilla.redhat.com/show_bug.cgi?id=1372768

https://bugzilla.redhat.com/show_bug.cgi?id=1375206

https://bugzilla.redhat.com/show_bug.cgi?id=1376145

https://bugzilla.redhat.com/show_bug.cgi?id=1376514

https://bugzilla.redhat.com/show_bug.cgi?id=1376516

https://bugzilla.redhat.com/show_bug.cgi?id=1376519

https://bugzilla.redhat.com/show_bug.cgi?id=1376521

https://bugzilla.redhat.com/show_bug.cgi?id=1376525

https://bugzilla.redhat.com/show_bug.cgi?id=1376526

https://bugzilla.redhat.com/show_bug.cgi?id=1377417

https://bugzilla.redhat.com/show_bug.cgi?id=1377418

https://bugzilla.redhat.com/show_bug.cgi?id=1378116

https://bugzilla.redhat.com/show_bug.cgi?id=1378173

https://bugzilla.redhat.com/show_bug.cgi?id=1378554

https://bugzilla.redhat.com/show_bug.cgi?id=1379692

https://bugzilla.redhat.com/show_bug.cgi?id=1379693

https://bugzilla.redhat.com/show_bug.cgi?id=1389760

https://bugzilla.redhat.com/show_bug.cgi?id=1389790

https://bugzilla.redhat.com/show_bug.cgi?id=1390697

https://bugzilla.redhat.com/show_bug.cgi?id=1390698

https://bugzilla.redhat.com/show_bug.cgi?id=1390724

https://bugzilla.redhat.com/show_bug.cgi?id=1391710

https://bugzilla.redhat.com/show_bug.cgi?id=1391721

https://bugzilla.redhat.com/show_bug.cgi?id=1391764

https://bugzilla.redhat.com/show_bug.cgi?id=1391980

https://bugzilla.redhat.com/show_bug.cgi?id=1392561

https://bugzilla.redhat.com/show_bug.cgi?id=1392964

https://bugzilla.redhat.com/show_bug.cgi?id=1393061

https://bugzilla.redhat.com/show_bug.cgi?id=1395305

https://bugzilla.redhat.com/show_bug.cgi?id=1396665

https://bugzilla.redhat.com/show_bug.cgi?id=1397093

https://bugzilla.redhat.com/show_bug.cgi?id=1397095

https://bugzilla.redhat.com/show_bug.cgi?id=1397516

https://bugzilla.redhat.com/show_bug.cgi?id=1399285

http://www.nessus.org/u?d965a2cc

https://access.redhat.com/errata/RHSA-2016:2839

https://bugzilla.redhat.com/show_bug.cgi?id=1379694

https://bugzilla.redhat.com/show_bug.cgi?id=1379697

https://bugzilla.redhat.com/show_bug.cgi?id=1379727

https://bugzilla.redhat.com/show_bug.cgi?id=1379728

https://bugzilla.redhat.com/show_bug.cgi?id=1380107

https://bugzilla.redhat.com/show_bug.cgi?id=1380170

https://bugzilla.redhat.com/show_bug.cgi?id=1381624

https://bugzilla.redhat.com/show_bug.cgi?id=1382072

https://bugzilla.redhat.com/show_bug.cgi?id=1382074

https://bugzilla.redhat.com/show_bug.cgi?id=1382164

https://bugzilla.redhat.com/show_bug.cgi?id=1382406

https://bugzilla.redhat.com/show_bug.cgi?id=1382408

https://bugzilla.redhat.com/show_bug.cgi?id=1382753

https://bugzilla.redhat.com/show_bug.cgi?id=1382819

https://bugzilla.redhat.com/show_bug.cgi?id=1382826

https://bugzilla.redhat.com/show_bug.cgi?id=1382834

https://bugzilla.redhat.com/show_bug.cgi?id=1382835

https://bugzilla.redhat.com/show_bug.cgi?id=1382836

https://bugzilla.redhat.com/show_bug.cgi?id=1382837

https://bugzilla.redhat.com/show_bug.cgi?id=1382846

https://bugzilla.redhat.com/show_bug.cgi?id=1382847

https://bugzilla.redhat.com/show_bug.cgi?id=1383368

https://bugzilla.redhat.com/show_bug.cgi?id=1383466

https://bugzilla.redhat.com/show_bug.cgi?id=1383469

https://bugzilla.redhat.com/show_bug.cgi?id=1383470

https://bugzilla.redhat.com/show_bug.cgi?id=1383497

https://bugzilla.redhat.com/show_bug.cgi?id=1385156

https://bugzilla.redhat.com/show_bug.cgi?id=1385173

https://bugzilla.redhat.com/show_bug.cgi?id=1386792

https://bugzilla.redhat.com/show_bug.cgi?id=1386793

https://bugzilla.redhat.com/show_bug.cgi?id=1386794

https://bugzilla.redhat.com/show_bug.cgi?id=1386797

https://bugzilla.redhat.com/show_bug.cgi?id=1388984

https://bugzilla.redhat.com/show_bug.cgi?id=1389025

Plugin Details

Severity: High

ID: 233050

File Name: redhat-RHSA-2016-2839.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/20/2025

Updated: 3/20/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2016-5402

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:freeipmi-ipmiseld, p-cpe:/a:redhat:enterprise_linux:freeipmi, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:freeipmi-devel, p-cpe:/a:redhat:enterprise_linux:freeipmi-bmc-watchdog, p-cpe:/a:redhat:enterprise_linux:cfme-appliance, p-cpe:/a:redhat:enterprise_linux:freeipmi-ipmidetectd, p-cpe:/a:redhat:enterprise_linux:cfme-gemset, p-cpe:/a:redhat:enterprise_linux:cfme

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/30/2016

Vulnerability Publication Date: 11/30/2016

Reference Information

CVE: CVE-2016-5402

CWE: 94

RHSA: 2016:2839