Bug 959041 (CVE-2013-2049) - CVE-2013-2049 CloudForms Management Engine 2: static secret_token.rb value
Summary: CVE-2013-2049 CloudForms Management Engine 2: static secret_token.rb value
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2013-2049
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 959045
Blocks: 959043 1011266
TreeView+ depends on / blocked
 
Reported: 2013-05-03 04:39 UTC by Kurt Seifried
Modified: 2023-05-12 19:08 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-11-13 01:39:09 UTC
Embargoed:


Attachments (Terms of Use)

Description Kurt Seifried 2013-05-03 04:39:05 UTC
Ruby on Rails uses a HMAC for verifying the integrity of signed cookies. To prevent session hash tampering, a digest is calculated from the session with a server-side secret and inserted into the end of the cookie.

It was found that CloudForms Management Engine (CFME) is using a statically defined secret, which is common across all deployments. A remote attacker could use this statically defined secret to perform a session tampering attack.

External references:

http://blog.phusion.nl/2013/01/04/securing-the-rails-session-secret/
http://blog.mhartl.com/2008/08/15/a-security-issue-with-rails-secret-session-keys/

Comment 4 Kurt Seifried 2013-10-22 05:11:12 UTC
Acknowledgements:

This issue was discovered by Ramon de C Valle of the Red Hat Product Security Team.

Comment 6 David Jorm 2013-11-13 01:39:09 UTC
Statement:

This issue is resolved in CloudForms 3.0. The maintenance support policy for CloudForms 2.0 only covers critical security issues, meaning this issue is out of scope. Users of CloudForms 2.0 are advised to upgrade to CloudForms 3.0 to address this issue.


Note You need to log in before you can comment on or make changes to this bug.