First published: Fri May 24 2013(Updated: )
Ramon de C Valle (rcvalle) reports: There is a mass assignment vulnerability in the create method of the UsersController controller. The create method in app/controllers/users_controller.rb deletes the user-controlled user[admin] parameter from the params hash but saves it to a local variable and assigns it to the newly created user object bypassing the :attr_protected mechanism. def create admin = params[:user].delete :admin @user = User.new(params[:user]){|u| u.admin = admin } if @user.save @user.roles << Role.find_by_name("Anonymous") unless @user.roles.map(&:name).include? "Anonymous" process_success else process_error end end Any non-admin user with permissions to create other (non-admin) users (i.e. with Manager role) can create arbitrary admin users by sending a specially-crafted POST request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack for IBM Power | =3.0 | |
The Foreman | <=1.2.0 | |
The Foreman | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2113 is classified as a medium severity vulnerability.
To fix CVE-2013-2113, update the UsersController to properly validate inputs and prevent mass assignment of unwanted parameters.
CVE-2013-2113 affects Red Hat OpenStack version 3.0 and Foreman versions 1.1 and below to 1.2.0 inclusive.
CVE-2013-2113 is a mass assignment vulnerability found in the create method of the UsersController.
CVE-2013-2113 was reported by Ramon de C Valle.