First published: Tue Apr 22 2014(Updated: )
Luke Meyer of Red Hat reports: Description of problem: The remote-user auth plugin provides an httpd config file intended to require authentication before setting the REMOTE_USER env var which is passed on to the plugin. However there are passthrough provisions for other forms of auth; in particular, the management console is allowed to set the X-Remote-User header on a request and have that transmuted to the REMOTE_USER env var (by virtue of being a non-proxied local request). When the REMOTE_USER env var is set, the remote-user plugin automatically trusts it. By combining the X-Remote-User header with one of the other passthrough triggers, any user can be impersonated without authenticating at all. Additional info: Simple workaround: add this in the host httpd conf global config, e.g. at the end of /etc/httpd/conf.d/000002_openshift_origin_broker_proxy.conf: RequestHeader unset X-Remote-User
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | <=1.2.7 | |
Red Hat OpenShift | >=2.0<=2.0.5 | |
<=1.2.7 | ||
>=2.0<=2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0188 has been classified as a moderate severity vulnerability.
To fix CVE-2014-0188, update Red Hat OpenShift to the latest version that addresses this vulnerability.
CVE-2014-0188 affects specific versions of Red Hat OpenShift platforms, particularly those up to version 2.0.5 and below 1.2.7.
Yes, CVE-2014-0188 can be exploited remotely due to its nature involving authentication bypass in the httpd config.
The potential impacts of CVE-2014-0188 include unauthorized access and control over resources intended to be protected.