A password disclosure flaw was found in the way Red Hat Network (RHN) Satellite Server, RHN Proxy Server and Spacewalk performed new system registration in the case of XMLRPC call failure. If a RHN Satellite, Proxy or Spacewalk user submitted a XMLRPC system registration call (together with their credentials) and processing of this request resulted in a failure, RHN Satellite, Proxy or Spacewalk administrator could use this deficiency to obtain plaintext form of a password for particular RHN Satellite, Proxy or Spacewalk user. References: [1] https://bugzilla.redhat.com/show_bug.cgi?id=749890 Spacewalk upstream patch: [2] http://git.fedorahosted.org/git/?p=spacewalk.git;a=commitdiff;h=76d0064693107148e4a949fc7ad62d72bb3ec26c
The CVE identifier of CVE-2012-0059 has been assigned to this issue.
This issue has been addressed in following products: Red Hat Network Proxy v 5.4 Via RHSA-2012:0102 https://rhn.redhat.com/errata/RHSA-2012-0102.html
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.4 Via RHSA-2012:0101 https://rhn.redhat.com/errata/RHSA-2012-0101.html