RHEL 8:Satellite 6.14.1 Async Security Update (Moderate) (RHSA-2023:7851)

high Nessus Plugin ID 194386

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 8 主機上安裝的多個套件受到 RHSA-2023:7851 公告中提及的多個弱點影響。

- foreman:任何人皆可讀取的檔案,其中包含密碼 (CVE-2023-4886)

- actionpack:透過 redirect_to 的使用者提供值可能導致 XSS 弱點 (CVE-2023-28362)

- GitPython:盲目式本機檔案引入 (CVE-2023-41040)

- python-urllib3:跨來源重新導向期間未去除 Cookie 要求標頭 (CVE-2023-43804)

- urllib3:從 303 狀態重新導向後未去除的要求內文將要求方法變更為 GET (CVE-2023-45803)

請注意,Nessus 並未測試這些問題,而是僅根據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?662f0b0b

http://www.nessus.org/u?a52677ca

https://bugzilla.redhat.com/show_bug.cgi?id=2217785

https://bugzilla.redhat.com/show_bug.cgi?id=2230135

https://bugzilla.redhat.com/show_bug.cgi?id=2246840

https://bugzilla.redhat.com/show_bug.cgi?id=2247040

https://bugzilla.redhat.com/show_bug.cgi?id=2250342

https://bugzilla.redhat.com/show_bug.cgi?id=2250343

https://bugzilla.redhat.com/show_bug.cgi?id=2250344

https://bugzilla.redhat.com/show_bug.cgi?id=2250345

https://bugzilla.redhat.com/show_bug.cgi?id=2250349

https://bugzilla.redhat.com/show_bug.cgi?id=2250350

https://bugzilla.redhat.com/show_bug.cgi?id=2250351

https://bugzilla.redhat.com/show_bug.cgi?id=2250352

https://bugzilla.redhat.com/show_bug.cgi?id=2251799

https://bugzilla.redhat.com/show_bug.cgi?id=2254080

https://bugzilla.redhat.com/show_bug.cgi?id=2254085

https://access.redhat.com/errata/RHSA-2023:7851

Plugin 詳細資訊

嚴重性: High

ID: 194386

檔案名稱: redhat-RHSA-2023-7851.nasl

版本: 1.2

類型: local

代理程式: unix

已發布: 2024/4/28

已更新: 2024/11/7

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.0

Vendor

Vendor Severity: Moderate

CVSS v2

風險因素: High

基本分數: 8.5

時間分數: 6.7

媒介: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

CVSS 評分資料來源: CVE-2023-43804

CVSS v3

風險因素: High

基本分數: 8.1

時間分數: 7.3

媒介: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

風險因素: Critical

Base Score: 9.3

Threat Score: 8.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:python-pulpcore, p-cpe:/a:redhat:enterprise_linux:rubygem-activejob, p-cpe:/a:redhat:enterprise_linux:satellite, p-cpe:/a:redhat:enterprise_linux:satellite-cli, p-cpe:/a:redhat:enterprise_linux:foreman-service, p-cpe:/a:redhat:enterprise_linux:python-gitpython, p-cpe:/a:redhat:enterprise_linux:foreman-vmware, p-cpe:/a:redhat:enterprise_linux:satellite-capsule, p-cpe:/a:redhat:enterprise_linux:rubygem-actionview, p-cpe:/a:redhat:enterprise_linux:foreman, p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello, p-cpe:/a:redhat:enterprise_linux:satellite-convert2rhel-toolkit, p-cpe:/a:redhat:enterprise_linux:rubygem-railties, p-cpe:/a:redhat:enterprise_linux:foreman-telemetry, p-cpe:/a:redhat:enterprise_linux:rubygem-activemodel, p-cpe:/a:redhat:enterprise_linux:pulpcore-selinux, p-cpe:/a:redhat:enterprise_linux:python39-pulpcore, p-cpe:/a:redhat:enterprise_linux:rubygem-katello, p-cpe:/a:redhat:enterprise_linux:foreman-postgresql, p-cpe:/a:redhat:enterprise_linux:foreman-dynflow-sidekiq, p-cpe:/a:redhat:enterprise_linux:rubygem-smart_proxy_remote_execution_ssh, p-cpe:/a:redhat:enterprise_linux:rubygem-rails, p-cpe:/a:redhat:enterprise_linux:python39-django-import-export, p-cpe:/a:redhat:enterprise_linux:rubygem-actioncable, p-cpe:/a:redhat:enterprise_linux:python39-createrepo_c, p-cpe:/a:redhat:enterprise_linux:foreman-ec2, p-cpe:/a:redhat:enterprise_linux:rubygem-activesupport, p-cpe:/a:redhat:enterprise_linux:rubygem-activerecord, p-cpe:/a:redhat:enterprise_linux:foreman-openstack, p-cpe:/a:redhat:enterprise_linux:foreman-cli, p-cpe:/a:redhat:enterprise_linux:python39-gitpython, p-cpe:/a:redhat:enterprise_linux:rubygem-actionpack, p-cpe:/a:redhat:enterprise_linux:createrepo_c-libs, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:python-pulp-rpm, p-cpe:/a:redhat:enterprise_linux:foreman-journald, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_remote_execution-cockpit, p-cpe:/a:redhat:enterprise_linux:foreman-redis, p-cpe:/a:redhat:enterprise_linux:foreman-installer, p-cpe:/a:redhat:enterprise_linux:foreman-ovirt, p-cpe:/a:redhat:enterprise_linux:rubygem-activestorage, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_leapp, p-cpe:/a:redhat:enterprise_linux:python39-pulp-rpm, p-cpe:/a:redhat:enterprise_linux:python3-createrepo_c, p-cpe:/a:redhat:enterprise_linux:rubygem-actiontext, p-cpe:/a:redhat:enterprise_linux:python-urllib3, p-cpe:/a:redhat:enterprise_linux:rubygem-actionmailer, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_remote_execution, p-cpe:/a:redhat:enterprise_linux:python39-urllib3, p-cpe:/a:redhat:enterprise_linux:python-django-import-export, p-cpe:/a:redhat:enterprise_linux:foreman-libvirt, p-cpe:/a:redhat:enterprise_linux:createrepo_c, p-cpe:/a:redhat:enterprise_linux:rubygem-actionmailbox, p-cpe:/a:redhat:enterprise_linux:foreman-debug, p-cpe:/a:redhat:enterprise_linux:satellite-common

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2023/12/14

弱點發布日期: 2023/8/26

參考資訊

CVE: CVE-2023-28362, CVE-2023-41040, CVE-2023-43804, CVE-2023-45803, CVE-2023-4886

CWE: 200, 22, 79

RHSA: 2023:7851