-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0099
         Important: cfme security, bug fix, and enhancement update
                              15 January 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           cfme
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Reduced Security                -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-7814 CVE-2014-3692 

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2015-0028.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: cfme security, bug fix, and enhancement update
Advisory ID:       RHSA-2015:0028-01
Product:           Red Hat CloudForms
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2015-0028.html
Issue date:        2015-01-14
CVE Names:         CVE-2014-3692 CVE-2014-7814 
=====================================================================

1. Summary:

Updated cfme packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat CloudForms 3.1.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.3 - noarch, x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

It was found that CloudForms Management Engine exposed SQL filters via the
REST API without any input escaping. An authenticated user could use this
flaw to perform SQL injection attacks against the CloudForms Management
Engine database. (CVE-2014-7814)

It was found that the CloudForms Management Engine customization template
used a default root password for newly created images if no root password
was specified. (CVE-2014-3692)

These issues were discovered by the Red Hat CloudForms Team.

This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available from the Technical Notes
document linked to in the References section.

All cfme users are advised to upgrade to these updated packages, which
contain correct these issues and add these enhancements.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1145304 - All Passwords visible in UI when viewing page source
1151258 - CVE-2014-3692 CFME: default fallback password in customization_templates.yml
1157881 - CVE-2014-7814 CFME: REST API SQL Injection
1161265 - Button triggered automate actions do not work
1161761 - Automate Explorer: "Error during 'save': Validation failed: Datatype is not included in the list" when trying to save input parameters for a Method
1163384 - UI: Missing route error for forest_delete action in Configuration/Configure/Settings/Authentication
1163875 - RedHat domain - OSE automate model initial checkin.
1164034 - Performance by Asset Type report undefined method error
1164035 - [RFE] Need ability to properly override service request message.
1164036 - Excon::Errors::Conflict]: Expected([200, 202]) <=> Actual(409 Conflict) with 2 security groups of the same name in the same tenant
1165305 - Openstack inventory collection fails with missing instances
1166214 - Callback url routing issue
1166215 - Chargeback throws "undefined method '[]' for nil:NilClass [configuration/form_field_changed]"
1166286 - Setting start page as Clouds/Availability Zones shows "Page doesnt exist"
1166290 - Text "Custom reports" displayed twice in import/Export Custom reports
1168336 - UI: Missing routes error on Infra/Cloud Provider & Resource Pool list views when user has saved searches
1168384 - Sorting and Paging does not work in Chargeback Rates list
1168564 - UI: Unable to save a dashboard change after moving a widget to a different spot
1170320 - Ext3 directory code should account for nil entries
1170682 - Update miq_ae_service_snapshot.rb with new relationship of vm_or_template
1170794 - Unable to create dashboard widget for trending reports or filter
1171343 - Deleting a Cluster with many policy_events takes forever and times out.
1171346 - ManageIQ - Resolve file differences resulting from model import/export round trip.
1171821 - 5.3.2.2 doesn't start evmserverd
1171899 - Storage: Adding a new Storage Manager does not work. Crashes with the error - Error caught: [ArgumentError] wrong number of arguments (2 for 1)
1172491 - Unable to schedule backup of internal vmdb_production DB using CFME console
1179957 - ose_installer fails with uninitialized constant FileUtils
1179959 - ose_installer fails with No such file or directory - /root/.openshift/oo-install-cfg.yml

6. Package List:

CloudForms Management Engine 5.3:

Source:
cfme-5.3.2.6-1.el6cf.src.rpm
ruby193-rubygem-fog-1.19.0-2.el6cf.src.rpm
ruby193-rubygem-linux_admin-0.9.4-1.el6cf.src.rpm

noarch:
ruby193-rubygem-fog-1.19.0-2.el6cf.noarch.rpm
ruby193-rubygem-linux_admin-0.9.4-1.el6cf.noarch.rpm

x86_64:
cfme-5.3.2.6-1.el6cf.x86_64.rpm
cfme-appliance-5.3.2.6-1.el6cf.x86_64.rpm
cfme-debuginfo-5.3.2.6-1.el6cf.x86_64.rpm
cfme-lib-5.3.2.6-1.el6cf.x86_64.rpm
mingw32-cfme-host-5.3.2.6-1.el6cf.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2014-3692
https://access.redhat.com/security/cve/CVE-2014-7814
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-US/CloudForms/3.1/html/Management_Engine_5.3_Technical_Notes/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFUttEkXlSAg2UNWIIRAioAAJ91U93e5A+kVUSN7y0kDE3hHfgc6ACglGr0
JD8CJb2SB7Q69xXsenVeD4k=
=fzvp
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVLb9qxLndAQH1ShLAQKWWA/8D7H+tCmondw5AJNeOpooLM6xdpHAk1g5
LPkhRxrqXOgsCSVtcGlGsIsggZ++H/ku4dQQGfWTqEH9pD3PbU0QzIKEjQgoHAhq
GdybQPd3zYFBG/8mpTYkWLsvU+DqowILsxpNroWUsDd5Ia0WhH/QX1L8Jt25iaHe
FvHJp0S4OFMCeiQBwZ5nw36liSKYXgmA5lypJEe2AWZi0aZD3CV9kzLQYIh9gMwp
CbDZQpTnbzQcxhArkCIxJ59DDj40P/yjpr94DrBpMEknqGdvo9WONdTC8/eDMYUT
Pri7NVuc66ZvxrT7d6nYrgphdtYUR6+9tvRdJ3++b0kwTRhFc8EtmF/WrEj69+GU
vqsKcsOjBx2/Mso24rymXYCT86Ek940q/JgrkqqUMdhfxtIKKymIEInQIeVLNJjC
pNeH3N9t9pAXn2hmEMZZz9DXKM1AmJq7Ikl9wGpttGgC5FbdhacJYsE8Ieq+hIpB
dO7yYeFQS6ootVpqeUEjcE2Em4sUOJV3xxsMuXntI3JXSk7/7ac8xhL16pkbR2ne
GJu7p5Y6Ovu0KjR9Z2qiTBg0FpgrlLPAzVO7Ed/F6uLpt3V+AUeb2/aIE/i32nXN
3wuHlSETn2Qz9J16LTUcqsVWiLgQoGp0tJOYOybmPdwZkPgNBReNYIZFfaQrjhWL
0mOmBQKhYKw=
=n2+O
-----END PGP SIGNATURE-----