First published: Thu Mar 28 2019(Updated: )
It was discovered that a world-readable log file belonging to Candlepin component of Red Hat Satellite 6.4 leaked the credentials of the Candlepin database. A malicious user with local access to a Satellite host can use those credentials to modify the database and prevent Satellite from fetching package updates, thus preventing all Satellite hosts from accessing those updates.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/candlepin | <2.4.15 | 2.4.15 |
redhat/candlepin | <2.5.15 | 2.5.15 |
Red Hat Satellite | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3891 is classified as a high severity vulnerability due to the potential exposure of sensitive database credentials.
To fix CVE-2019-3891, update the Candlepin component to version 2.4.15 or 2.5.15 as recommended by Red Hat.
CVE-2019-3891 allows a local attacker to access sensitive database credentials, enabling unauthorized modifications to the database.
Yes, CVE-2019-3891 specifically affects Candlepin versions prior to 2.4.15 and 2.5.15 in Red Hat Satellite 6.4.
A malicious user with local access to a Satellite host can exploit CVE-2019-3891 to compromise the system.