Updated openshift-origin-broker andrubygem-openshift-origin-auth-remote-user packages that fix one securityissue are now available for Red Hat OpenShift Enterprise 2.0.5.The Red Hat Security Response Team has rated this update as having Criticalsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available from the CVE link inthe References section.
The openshift-origin-broker package provides the OpenShift Broker servicethat manages all user logins, DNS name resolution, application states, andgeneral orchestration of the applications.The rubygem-openshift-origin-auth-remote-user package provides the remoteuser authentication plug-in.A flaw was found in the way openshift-origin-broker handled authenticationrequests via the remote user authentication plug-in. A remote attacker ableto submit a request to openshift-origin-broker could set the X-Remote-Userheader, and send the request to a passthrough trigger, resulting in abypass of the authentication checks to gain access to any OpenShift useraccount on the system. (CVE-2014-0188)All users of Red Hat OpenShift Enterprise 2.0.5 are advised to upgrade tothese updated packages, which contain a backported patch to correct thisissue. After installing the updated packages, restart the httpd daemon forthis update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
1090120 – CVE-2014-0188 OpenShift: openshift-origin-broker plugin allows impersonation
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: