First published: Thu Sep 11 2014(Updated: )
The katello-configure package provides the katello-configure script, which<br>configures the Katello installation, and the katello-upgrade script, which<br>handles upgrades between versions.<br>It was discovered that the default configuration of Elasticsearch enabled<br>dynamic scripting, allowing a remote attacker to execute arbitrary MVEL<br>expressions and Java code via the source parameter passed to _search.<br>(CVE-2014-3120)<br>All Subscription Asset Manager users are advised to upgrade to this updated<br>package. The update provides a script that modifies the elasticsearch.yml<br>configuration file to disable dynamic scripting. After updating, run the<br>"katello-configure" command. This will update the elasticsearch.yml<br>configuration file and restart the elasticsearch service.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/katello-configure | <1.4.5.1-3.el6 | 1.4.5.1-3.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.