First published: Wed Oct 30 2013(Updated: )
It was found that the web interface provided by Red Hat Satellite to create the initial administrator user was not disabled after the initial user was created. A remote attacker could use this flaw to create an administrator user with credentials they specify. This user could then be used to assume control of the Satellite server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | <=5.6 | |
redhat satellite | <=5.6 | |
Red Hat Satellite with Embedded Oracle | =5.2 | |
Red Hat Satellite with Embedded Oracle | =5.3 | |
Red Hat Satellite with Embedded Oracle | =5.4 | |
Red Hat Satellite with Embedded Oracle | =5.5 | |
SUSE Manager | =1.7 | |
SUSE Linux Enterprise Server | =11.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4480 is considered a critical vulnerability due to its ability to allow remote attackers to create administrator accounts.
To fix CVE-2013-4480, ensure that the web interface for creating the initial administrator user is disabled after the initial setup.
CVE-2013-4480 affects Red Hat Satellite versions up to 5.6, including the versions with Embedded Oracle from 5.2 to 5.5.
A workaround for CVE-2013-4480 involves restricting access to the web interface by limiting network access or using firewall rules.
Yes, CVE-2013-4480 can be exploited remotely, allowing attackers to create unauthorized administrator accounts.