CVE-2012-3503
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
25/08/2012
Last modified:
11/04/2025
Description
The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:* | 1.0 (including) | |
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2012-1186.html
- http://rhn.redhat.com/errata/RHSA-2012-1187.html
- http://secunia.com/advisories/50344
- http://www.securityfocus.com/bid/55140
- https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3
- https://github.com/Katello/katello/pull/499
- http://rhn.redhat.com/errata/RHSA-2012-1186.html
- http://rhn.redhat.com/errata/RHSA-2012-1187.html
- http://secunia.com/advisories/50344
- http://www.securityfocus.com/bid/55140
- https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3
- https://github.com/Katello/katello/pull/499



