Bug 1790381 (CVE-2020-1693)
Summary: | CVE-2020-1693 spacewalk: XML entity attacks on /rpc/api | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | msiddiqu |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | bkearney, cbuissar, mmraka, security-response-team, tlestach |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | redstone-xmlrpc 1.1_20071120-21, spacewalk 2.10 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Spacewalk where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-11-15 13:07:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1791164 | ||
Bug Blocks: | 1785261 |
Description
msiddiqu
2020-01-13 09:36:12 UTC
Acknowledgments: Name: Thibaut Zonca This vulnerability is closely related to CVE-2018-1077, previously reported and fixed in bz 1555429. Statement: This flaw was rated Medium in the context of Red Hat Satellite v.5, because it does not allow remote code execution, and because of the limitation imposed when retrieving file content. |