First published: Thu Feb 28 2019(Updated: )
A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | <6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3845 is classified as a medium severity vulnerability due to its potential for unauthorized access.
To fix CVE-2019-3845, update your Red Hat Satellite to version 6.2 or later.
CVE-2019-3845 affects Red Hat Satellite versions prior to 6.2 and Satellite Capsule 6.1.
Yes, a malicious authenticated user can exploit CVE-2019-3845 to access unauthorized message queues.
There are no known workarounds for CVE-2019-3845; the recommended solution is to upgrade the software.