First published: Tue Mar 04 2014(Updated: )
Jeremy Choi and Keqin Hong of the Red Hat HSS Pen-Test Team reported that under some circumstances foreman did not generate new session-id's for every login. This flaw could allow authentication to be bypassed through session fixation attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TheForeman Foreman | <=1.4.1 | |
TheForeman Foreman | =1.0 | |
TheForeman Foreman | =1.1 | |
TheForeman Foreman | =1.2.0 | |
TheForeman Foreman | =1.2.0-rc1 | |
TheForeman Foreman | =1.2.0-rc2 | |
TheForeman Foreman | =1.2.1 | |
TheForeman Foreman | =1.2.2 | |
TheForeman Foreman | =1.2.3 | |
TheForeman Foreman | =1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0090 has a medium severity rating due to its potential for session fixation attacks.
To fix CVE-2014-0090, upgrade Foreman to version 1.4.2 or later.
CVE-2014-0090 could allow attackers to perform session fixation attacks, potentially leading to unauthorized access.
CVE-2014-0090 affects Foreman versions prior to 1.4.2, including 1.0, 1.1, 1.2.0, and 1.4.1.
CVE-2014-0090 was reported by Jeremy Choi and Keqin Hong from the Red Hat HSS Pen-Test Team.