Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

         Important: cfme security, bug fix, and enhancement update
                              15 January 2015


        AusCERT Security Bulletin Summary

Product:           cfme
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Reduced Security                -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-7814 CVE-2014-3692 

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Important: cfme security, bug fix, and enhancement update
Advisory ID:       RHSA-2015:0028-01
Product:           Red Hat CloudForms
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2015-0028.html
Issue date:        2015-01-14
CVE Names:         CVE-2014-3692 CVE-2014-7814 

1. Summary:

Updated cfme packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat CloudForms 3.1.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.3 - noarch, x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

It was found that CloudForms Management Engine exposed SQL filters via the
REST API without any input escaping. An authenticated user could use this
flaw to perform SQL injection attacks against the CloudForms Management
Engine database. (CVE-2014-7814)

It was found that the CloudForms Management Engine customization template
used a default root password for newly created images if no root password
was specified. (CVE-2014-3692)

These issues were discovered by the Red Hat CloudForms Team.

This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available from the Technical Notes
document linked to in the References section.

All cfme users are advised to upgrade to these updated packages, which
contain correct these issues and add these enhancements.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at

5. Bugs fixed (https://bugzilla.redhat.com/):

1145304 - All Passwords visible in UI when viewing page source
1151258 - CVE-2014-3692 CFME: default fallback password in customization_templates.yml
1157881 - CVE-2014-7814 CFME: REST API SQL Injection
1161265 - Button triggered automate actions do not work
1161761 - Automate Explorer: "Error during 'save': Validation failed: Datatype is not included in the list" when trying to save input parameters for a Method
1163384 - UI: Missing route error for forest_delete action in Configuration/Configure/Settings/Authentication
1163875 - RedHat domain - OSE automate model initial checkin.
1164034 - Performance by Asset Type report undefined method error
1164035 - [RFE] Need ability to properly override service request message.
1164036 - Excon::Errors::Conflict]: Expected([200, 202]) <=> Actual(409 Conflict) with 2 security groups of the same name in the same tenant
1165305 - Openstack inventory collection fails with missing instances
1166214 - Callback url routing issue
1166215 - Chargeback throws "undefined method '[]' for nil:NilClass [configuration/form_field_changed]"
1166286 - Setting start page as Clouds/Availability Zones shows "Page doesnt exist"
1166290 - Text "Custom reports" displayed twice in import/Export Custom reports
1168336 - UI: Missing routes error on Infra/Cloud Provider & Resource Pool list views when user has saved searches
1168384 - Sorting and Paging does not work in Chargeback Rates list
1168564 - UI: Unable to save a dashboard change after moving a widget to a different spot
1170320 - Ext3 directory code should account for nil entries
1170682 - Update miq_ae_service_snapshot.rb with new relationship of vm_or_template
1170794 - Unable to create dashboard widget for trending reports or filter
1171343 - Deleting a Cluster with many policy_events takes forever and times out.
1171346 - ManageIQ - Resolve file differences resulting from model import/export round trip.
1171821 - doesn't start evmserverd
1171899 - Storage: Adding a new Storage Manager does not work. Crashes with the error - Error caught: [ArgumentError] wrong number of arguments (2 for 1)
1172491 - Unable to schedule backup of internal vmdb_production DB using CFME console
1179957 - ose_installer fails with uninitialized constant FileUtils
1179959 - ose_installer fails with No such file or directory - /root/.openshift/oo-install-cfg.yml

6. Package List:

CloudForms Management Engine 5.3:




These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from

7. References:


8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.
Version: GnuPG v1


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967