Bug 1208294 (CVE-2015-1848, CVE-2015-3983) - CVE-2015-1848 CVE-2015-3983 pcs: improper web session variable signing
Summary: CVE-2015-1848 CVE-2015-3983 pcs: improper web session variable signing
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-1848, CVE-2015-3983
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: Engineering1211565 Engineering1211566 Engineering1211567 Engineering1211568
Blocks: Embargoed1210268 Embargoed1210464
TreeView+ depends on / blocked
 
Reported: 2015-04-01 21:31 UTC by Martin Prpič
Modified: 2023-05-12 23:32 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI.
Clone Of:
Environment:
Last Closed: 2015-05-12 21:25:22 UTC


Attachments (Terms of Use)
secure-cookie.patch (629 bytes, text/plain)
2015-04-01 21:32 UTC, Martin Prpič
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0980 0 normal SHIPPED_LIVE Important: pcs security and bug fix update 2015-05-12 19:44:49 UTC
Red Hat Product Errata RHSA-2015:0990 0 normal SHIPPED_LIVE Important: pcs security and bug fix update 2015-05-12 21:59:13 UTC

Description Martin Prpič 2015-04-01 21:31:39 UTC
It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI.

Comment 1 Martin Prpič 2015-04-01 21:32:24 UTC
Created attachment 1009855 [details]
secure-cookie.patch

Comment 9 Ján Rusnačko 2015-04-13 20:48:33 UTC
Acknowledgements:

This issue was discovered by Tomas Jelinek of Red Hat.

Comment 13 errata-xmlrpc 2015-05-12 15:45:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:0980 https://rhn.redhat.com/errata/RHSA-2015-0980.html

Comment 14 errata-xmlrpc 2015-05-12 17:59:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2015:0990 https://rhn.redhat.com/errata/RHSA-2015-0990.html

Comment 15 Martin Prpič 2015-05-18 15:12:08 UTC
MITRE assigned a second CVE for the issue tracked in this bug:

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.

Comment 16 Fedora Update System 2015-06-04 20:11:29 UTC
pcs-0.9.115-3.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 17 Fedora Update System 2015-06-04 20:16:27 UTC
pcs-0.9.137-4.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 18 Fedora Update System 2015-06-04 20:17:56 UTC
pcs-0.9.139-4.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.