Bug 1157881 (CVE-2014-7814) - CVE-2014-7814 CFME: REST API SQL Injection
Summary: CVE-2014-7814 CFME: REST API SQL Injection
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-7814
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1157883 1157884
Blocks: 1157882
TreeView+ depends on / blocked
 
Reported: 2014-10-27 23:56 UTC by Kurt Seifried
Modified: 2019-09-29 13:23 UTC (History)
16 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that CloudForms 4 exposed SQL filters via the REST API without any input escaping. An authenticated user could use this flaw to perform SQL injection attacks against the CloudForms Management Engine database.
Clone Of:
Environment:
Last Closed: 2015-01-14 20:40:24 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0028 normal SHIPPED_LIVE Important: cfme security, bug fix, and enhancement update 2015-01-15 00:41:27 UTC

Description Kurt Seifried 2014-10-27 23:56:02 UTC
Aaron Patterson of Red Hat reports:

If the REST API is going to support a filter, that should be converted to an 
ActiveRecord where clause - where it should be safer.  In general, it would be 
good to understand why we offer SQL filters on the REST API because I do not 
think they should be exposed.

Comment 2 Kurt Seifried 2015-01-08 16:01:41 UTC
Acknowledgement:

This issue was discovered by the Red Hat CloudForms Team.

Comment 3 errata-xmlrpc 2015-01-14 19:42:27 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 5.3

Via RHSA-2015:0028 https://rhn.redhat.com/errata/RHSA-2015-0028.html


Note You need to log in before you can comment on or make changes to this bug.