Bug 452461 (CVE-2008-2369) - CVE-2008-2369 RHN Satellite: information disclosure via manzier.pxt RPC script
Summary: CVE-2008-2369 RHN Satellite: information disclosure via manzier.pxt RPC script
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-2369
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 452196 452462 452463 452464
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-06-23 06:57 UTC by Tomas Hoger
Modified: 2019-09-29 12:24 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-08-24 08:19:05 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0630 0 normal SHIPPED_LIVE Low: Red Hat Network Satellite Server security update 2008-08-13 14:55:17 UTC

Description Tomas Hoger 2008-06-23 06:57:30 UTC
It was discovered that Red Hat Network Satellite used authentication based on a
single key hard-coded in the source code in the XML-RPC script manzier.pxt. 
Remote attacker able to connect to Satellite could use this to obtain some
information about RHN Satellite users (such as login names, associated email
addresses, internal user IDs, partial information about entitlements).

Comment 4 Mark J. Cox 2008-08-13 14:39:14 UTC
removing embargo

Comment 5 Tomas Hoger 2011-08-24 08:19:05 UTC
This issue was corrected in RHN Satellite 5.1:
  https://www.redhat.com/security/data/cve/CVE-2008-2369.html

There's no plan to address this in RHN Satellite 5.0 and earlier.


Note You need to log in before you can comment on or make changes to this bug.