RHCOS 2:红帽OpenShift Enterprise 2.2.9 (RHSA-2016:0489)

medium Nessus 插件 ID 311965

简介

远程的 Red Hat CoreOS 主机缺少一个或多个安全更新。

描述

远程的Red Hat Enterprise Linux CoreOS 2主机安装了受多重漏洞影响的包,如公告中 RHSA-2016:0489 提及。

- ObjectMessage:不安全反序列化(CVE-2015-5254)

- jenkins:通过指纹披露项目名称(SECURITY-153)(CVE-2015-5317)

- jenkins:用于CSRF保护盐的公共价值(SECURITY-169)(CVE-2015-5318)

- jenkins:通过CLI注入作业配置(SECURITY-173)(CVE-2015-5319)

- jenkins:连接从站时未验证密钥(SECURITY-184)(CVE-2015-5320)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1111456

https://bugzilla.redhat.com/show_bug.cgi?id=1140816

https://bugzilla.redhat.com/show_bug.cgi?id=1160934

https://bugzilla.redhat.com/show_bug.cgi?id=1168480

https://bugzilla.redhat.com/show_bug.cgi?id=1169690

https://bugzilla.redhat.com/show_bug.cgi?id=1265423

https://bugzilla.redhat.com/show_bug.cgi?id=1265811

https://bugzilla.redhat.com/show_bug.cgi?id=1279584

https://bugzilla.redhat.com/show_bug.cgi?id=1282359

https://bugzilla.redhat.com/show_bug.cgi?id=1282361

https://bugzilla.redhat.com/show_bug.cgi?id=1282362

https://bugzilla.redhat.com/show_bug.cgi?id=1282363

https://bugzilla.redhat.com/show_bug.cgi?id=1282364

https://bugzilla.redhat.com/show_bug.cgi?id=1282365

https://bugzilla.redhat.com/show_bug.cgi?id=1282366

https://bugzilla.redhat.com/show_bug.cgi?id=1282367

https://bugzilla.redhat.com/show_bug.cgi?id=1282368

https://bugzilla.redhat.com/show_bug.cgi?id=1282369

https://bugzilla.redhat.com/show_bug.cgi?id=1282371

https://bugzilla.redhat.com/show_bug.cgi?id=1283372

https://bugzilla.redhat.com/show_bug.cgi?id=1291292

https://bugzilla.redhat.com/show_bug.cgi?id=1291795

https://bugzilla.redhat.com/show_bug.cgi?id=1291797

https://bugzilla.redhat.com/show_bug.cgi?id=1291798

https://bugzilla.redhat.com/show_bug.cgi?id=1294513

https://bugzilla.redhat.com/show_bug.cgi?id=1299014

https://bugzilla.redhat.com/show_bug.cgi?id=1299095

https://bugzilla.redhat.com/show_bug.cgi?id=1302787

https://bugzilla.redhat.com/show_bug.cgi?id=1305688

https://bugzilla.redhat.com/show_bug.cgi?id=1307174

https://bugzilla.redhat.com/show_bug.cgi?id=1307175

https://bugzilla.redhat.com/show_bug.cgi?id=1308716

https://bugzilla.redhat.com/show_bug.cgi?id=1308718

https://bugzilla.redhat.com/show_bug.cgi?id=1308720

https://bugzilla.redhat.com/show_bug.cgi?id=1308722

https://bugzilla.redhat.com/show_bug.cgi?id=1308739

https://bugzilla.redhat.com/show_bug.cgi?id=1310247

https://bugzilla.redhat.com/show_bug.cgi?id=1310266

https://bugzilla.redhat.com/show_bug.cgi?id=1310841

https://bugzilla.redhat.com/show_bug.cgi?id=1314535

https://bugzilla.redhat.com/show_bug.cgi?id=1314546

http://www.nessus.org/u?f95f036a

https://access.redhat.com/errata/RHSA-2016:0489

插件详情

严重性: Medium

ID: 311965

文件名: rhcos-RHSA-2016-0489.nasl

版本: 1.2

类型: Local

代理: unix

发布时间: 2026/5/4

最近更新时间: 2026/5/5

支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: High

分数: 7.4

Vendor

Vendor Severity: Important

CVSS v2

风险因素: High

基本分数: 7.6

时间分数: 6.3

矢量: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2015-7539

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 9.1

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:F/RL:O/RC:C

CVSS 分数来源: CVE-2015-8103

CVSS v4

风险因素: Medium

Base Score: 6.9

Threat Score: 6.9

Threat Vector: CVSS:4.0/E:A

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

CVSS 分数来源: CVE-2015-5325

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade-broker, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-cron, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-proxy, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:php-fpm, cpe:/o:redhat:enterprise_linux:6:coreos, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-yum-validator, p-cpe:/a:redhat:enterprise_linux:php-bcmath, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-common, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-release, p-cpe:/a:redhat:enterprise_linux:php-devel, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade-node, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-console, p-cpe:/a:redhat:enterprise_linux:php, p-cpe:/a:redhat:enterprise_linux:openshift-origin-msg-node-mcollective, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-mysql, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-haproxy, p-cpe:/a:redhat:enterprise_linux:activemq-client, p-cpe:/a:redhat:enterprise_linux:php-imap, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-apache-vhost, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-python, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-php, p-cpe:/a:redhat:enterprise_linux:php-mbstring, p-cpe:/a:redhat:enterprise_linux:php-intl, p-cpe:/a:redhat:enterprise_linux:activemq, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:rhc, p-cpe:/a:redhat:enterprise_linux:php-process

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2016/3/22

漏洞发布日期: 2015/11/11

CISA 已知可遭利用的漏洞到期日期: 2023/6/2

可利用的方式

CANVAS (CANVAS)

Core Impact

Metasploit (OpenNMS Java Object Unserialization Remote Code Execution)

参考资料信息

CVE: CVE-2015-5254, CVE-2015-5317, CVE-2015-5318, CVE-2015-5319, CVE-2015-5320, CVE-2015-5321, CVE-2015-5322, CVE-2015-5323, CVE-2015-5324, CVE-2015-5325, CVE-2015-5326, CVE-2015-7537, CVE-2015-7538, CVE-2015-7539, CVE-2015-8103

CWE: 352, 502, 79

RHSA: 2016:0489