It was found that Red Hat Network (RHN) Satellite and Spacewalk services did not protect against Cross-Site Request Forgery (CSRF) attacks. If an authenticated RHN Satellite or Spacewalk service user visited a specially- crafted web page, it could lead to unauthorized command execution with the privileges of that user, for example, creating a new user account, granting administrator privileges to user accounts, disabling the account of the current user, and so on. Acknowledgements: Red Hat would like to thank Christian Johansson of Bitsec AB and Thomas Biege of the SUSE Security Team for independently reporting this issue.
This issue affects the versions of the spacewalk-java package, as shipped with Red Hat Network Satellite Server version 5.3.0, and 5.4.0.
Statement: Vulnerable. This issue has been addressed in Red Hat Network Satellite Server v 5.4.1 via RHSA-2011:0879 https://rhn.redhat.com/errata/RHSA-2011-0879.html. This issue is not planned to be fixed in Red Hat Network Satellite Server version 5.3.0.
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.4 Via RHSA-2011:0879 https://rhn.redhat.com/errata/RHSA-2011-0879.html
Spacewalk commit: https://git.fedorahosted.org/cgit/spacewalk.git/commit/?id=86afbf7c8bec544f44c9e9a65fad453422389cfe