First published: Sat Oct 17 2009(Updated: )
It was found that Red Hat Network (RHN) Satellite and Spacewalk services did not protect against Cross-Site Request Forgery (CSRF) attacks. If an authenticated RHN Satellite or Spacewalk service user visited a specially- crafted web page, it could lead to unauthorized command execution with the privileges of that user, for example, creating a new user account, granting administrator privileges to user accounts, disabling the account of the current user, and so on. Acknowledgements: Red Hat would like to thank Christian Johansson of Bitsec AB and Thomas Biege of the SUSE Security Team for independently reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Network Satellite | ||
Spacewalk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-529483 is typically classified as high due to the potential for unauthorized command execution via CSRF attacks.
To fix REDHAT-BUG-529483, update to the latest version of Red Hat Network Satellite or Spacewalk that includes the security patches addressing CSRF vulnerabilities.
REDHAT-BUG-529483 is associated with vulnerabilities related to Cross-Site Request Forgery (CSRF) that can lead to unauthorized actions by authenticated users.
Users of Red Hat Network Satellite and Spacewalk are affected by REDHAT-BUG-529483 if they do not implement the recommended security updates.
REDHAT-BUG-529483 exploits Cross-Site Request Forgery (CSRF), allowing attackers to execute unauthorized commands on behalf of authenticated users.