Improper access control in Red Hat Satellite - CVE-2016-9595

 

Improper access control in Red Hat Satellite - CVE-2016-9595

Published: February 27, 2018 / Updated: March 27, 2018


Vulnerability identifier: #VU10759
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-9595
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Red Hat Inc.
Affected software:
Red Hat Satellite

Detailed vulnerability description

The vulnerability allows a local attacker to launch a symlink attack on the target system.

The weakness exists in the katello-debug due to insecure usage of temporary files by certain scripts and log files. A local attacker can create a symbolic link from a temporary file to various files on the system, bypass local access protections to overwrite the contents of arbitrary files.

How to mitigate CVE-2016-9595

Update to version 6.3.

Sources