First published: Sat Oct 17 2009(Updated: )
Cross-site request forgery (CSRF) vulnerability in the Spacewalk Java site packages (aka spacewalk-java) 1.2.39 in Spacewalk, as used in the server in Red Hat Network Satellite 5.3.0 through 5.4.1 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that (1) disable the current user account, (2) add user accounts, or (3) modify user accounts to have administrator privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | =5.3.0 | |
Red Hat Satellite | =5.4.0 | |
Red Hat Satellite | =5.4.1 | |
Red Hat Spacewalk | =1.2.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4139 is considered a moderate severity vulnerability due to its potential for CSRF attacks that can hijack user authentication.
To fix CVE-2009-4139, upgrade to a version of Red Hat Network Satellite or Spacewalk that has mitigated this vulnerability, such as 5.4.2 or later.
CVE-2009-4139 affects Red Hat Network Satellite Server versions 5.3.0 to 5.4.1 and Spacewalk Java version 1.2.39.
Exploiting CVE-2009-4139 could allow an attacker to perform unauthorized actions on behalf of authenticated users.
To mitigate the risk of CVE-2009-4139, consider implementing additional CSRF protections such as requiring tokens for sensitive requests.