RHSA-2018_1972

Vulnerability from csaf_redhat - Published: 2018-06-25 14:17 - Updated: 2024-11-22 11:48
Summary
Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update
Severity
Important
Notes
Topic: An update is now available for CloudForms Management Engine 5.8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Security Fix(es): * python-paramiko: Authentication bypass in transport.py (CVE-2018-7750) * ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101) * ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Simon Vikström for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.

CWE-266 - Incorrect Privilege Assignment
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:1972

Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:1972

It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.

CWE-287 - Improper Authentication
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:1972
References
https://access.redhat.com/errata/RHSA-2018:1972 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=1489507 external
https://bugzilla.redhat.com/show_bug.cgi?id=1496902 external
https://bugzilla.redhat.com/show_bug.cgi?id=1500951 external
https://bugzilla.redhat.com/show_bug.cgi?id=1511030 external
https://bugzilla.redhat.com/show_bug.cgi?id=1526156 external
https://bugzilla.redhat.com/show_bug.cgi?id=1531499 external
https://bugzilla.redhat.com/show_bug.cgi?id=1532272 external
https://bugzilla.redhat.com/show_bug.cgi?id=1533082 external
https://bugzilla.redhat.com/show_bug.cgi?id=1535369 external
https://bugzilla.redhat.com/show_bug.cgi?id=1536684 external
https://bugzilla.redhat.com/show_bug.cgi?id=1537132 external
https://bugzilla.redhat.com/show_bug.cgi?id=1540579 external
https://bugzilla.redhat.com/show_bug.cgi?id=1541341 external
https://bugzilla.redhat.com/show_bug.cgi?id=1541427 external
https://bugzilla.redhat.com/show_bug.cgi?id=1541700 external
https://bugzilla.redhat.com/show_bug.cgi?id=1544488 external
https://bugzilla.redhat.com/show_bug.cgi?id=1549626 external
https://bugzilla.redhat.com/show_bug.cgi?id=1549723 external
https://bugzilla.redhat.com/show_bug.cgi?id=1549833 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550116 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550276 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550715 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550729 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550732 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550737 external
https://bugzilla.redhat.com/show_bug.cgi?id=1551627 external
https://bugzilla.redhat.com/show_bug.cgi?id=1551693 external
https://bugzilla.redhat.com/show_bug.cgi?id=1551697 external
https://bugzilla.redhat.com/show_bug.cgi?id=1551699 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552135 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552233 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552780 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552891 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552905 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553225 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553249 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553308 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553331 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553337 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553364 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553465 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553473 external
https://bugzilla.redhat.com/show_bug.cgi?id=1554533 external
https://bugzilla.redhat.com/show_bug.cgi?id=1554543 external
https://bugzilla.redhat.com/show_bug.cgi?id=1554900 external
https://bugzilla.redhat.com/show_bug.cgi?id=1555487 external
https://bugzilla.redhat.com/show_bug.cgi?id=1556814 external
https://bugzilla.redhat.com/show_bug.cgi?id=1557025 external
https://bugzilla.redhat.com/show_bug.cgi?id=1557130 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558032 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558039 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558047 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558076 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558595 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558622 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559551 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559553 external
https://bugzilla.redhat.com/show_bug.cgi?id=1560097 external
https://bugzilla.redhat.com/show_bug.cgi?id=1560099 external
https://bugzilla.redhat.com/show_bug.cgi?id=1560693 external
https://bugzilla.redhat.com/show_bug.cgi?id=1561077 external
https://bugzilla.redhat.com/show_bug.cgi?id=1562773 external
https://bugzilla.redhat.com/show_bug.cgi?id=1562775 external
https://bugzilla.redhat.com/show_bug.cgi?id=1562798 external
https://bugzilla.redhat.com/show_bug.cgi?id=1563492 external
https://bugzilla.redhat.com/show_bug.cgi?id=1563721 external
https://bugzilla.redhat.com/show_bug.cgi?id=1563741 external
https://bugzilla.redhat.com/show_bug.cgi?id=1564264 external
https://bugzilla.redhat.com/show_bug.cgi?id=1564454 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565157 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565162 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565169 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565248 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565342 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565358 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565362 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565364 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565365 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565366 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565389 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565403 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565414 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565678 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565724 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565760 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565835 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565862 external
https://bugzilla.redhat.com/show_bug.cgi?id=1566256 external
https://bugzilla.redhat.com/show_bug.cgi?id=1566528 external
https://bugzilla.redhat.com/show_bug.cgi?id=1566746 external
https://bugzilla.redhat.com/show_bug.cgi?id=1567983 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568016 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568042 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568045 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568084 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568159 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568168 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568576 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568603 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569079 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569100 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569104 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569118 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569127 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569171 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569179 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569230 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569237 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569241 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570060 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570951 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570990 external
https://bugzilla.redhat.com/show_bug.cgi?id=1571311 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572621 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572719 external
https://bugzilla.redhat.com/show_bug.cgi?id=1573540 external
https://bugzilla.redhat.com/show_bug.cgi?id=1574155 external
https://bugzilla.redhat.com/show_bug.cgi?id=1574571 external
https://bugzilla.redhat.com/show_bug.cgi?id=1574615 external
https://bugzilla.redhat.com/show_bug.cgi?id=1576101 external
https://bugzilla.redhat.com/show_bug.cgi?id=1578575 external
https://bugzilla.redhat.com/show_bug.cgi?id=1578853 external
https://bugzilla.redhat.com/show_bug.cgi?id=1578866 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581387 external
https://bugzilla.redhat.com/show_bug.cgi?id=1583711 external
https://bugzilla.redhat.com/show_bug.cgi?id=1583790 external
https://bugzilla.redhat.com/show_bug.cgi?id=1584187 external
https://bugzilla.redhat.com/show_bug.cgi?id=1584688 external
https://bugzilla.redhat.com/show_bug.cgi?id=1589834 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2018-1101 self
https://bugzilla.redhat.com/show_bug.cgi?id=1563492 external
https://www.cve.org/CVERecord?id=CVE-2018-1101 external
https://nvd.nist.gov/vuln/detail/CVE-2018-1101 external
https://access.redhat.com/security/cve/CVE-2018-1104 self
https://bugzilla.redhat.com/show_bug.cgi?id=1565862 external
https://www.cve.org/CVERecord?id=CVE-2018-1104 external
https://nvd.nist.gov/vuln/detail/CVE-2018-1104 external
https://access.redhat.com/security/cve/CVE-2018-7750 self
https://bugzilla.redhat.com/show_bug.cgi?id=1557130 external
https://www.cve.org/CVERecord?id=CVE-2018-7750 external
https://nvd.nist.gov/vuln/detail/CVE-2018-7750 external
Acknowledgments
Red Hat Graham Mainwaring
Simon Vikström

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2018:1972",
        "url": "https://access.redhat.com/errata/RHSA-2018:1972"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1489507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489507"
      },
      {
        "category": "external",
        "summary": "1496902",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496902"
      },
      {
        "category": "external",
        "summary": "1500951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500951"
      },
      {
        "category": "external",
        "summary": "1511030",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511030"
      },
      {
        "category": "external",
        "summary": "1526156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526156"
      },
      {
        "category": "external",
        "summary": "1531499",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531499"
      },
      {
        "category": "external",
        "summary": "1532272",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532272"
      },
      {
        "category": "external",
        "summary": "1533082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533082"
      },
      {
        "category": "external",
        "summary": "1535369",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535369"
      },
      {
        "category": "external",
        "summary": "1536684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536684"
      },
      {
        "category": "external",
        "summary": "1537132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537132"
      },
      {
        "category": "external",
        "summary": "1540579",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540579"
      },
      {
        "category": "external",
        "summary": "1541341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541341"
      },
      {
        "category": "external",
        "summary": "1541427",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541427"
      },
      {
        "category": "external",
        "summary": "1541700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541700"
      },
      {
        "category": "external",
        "summary": "1544488",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544488"
      },
      {
        "category": "external",
        "summary": "1549626",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549626"
      },
      {
        "category": "external",
        "summary": "1549723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549723"
      },
      {
        "category": "external",
        "summary": "1549833",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549833"
      },
      {
        "category": "external",
        "summary": "1550116",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550116"
      },
      {
        "category": "external",
        "summary": "1550276",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550276"
      },
      {
        "category": "external",
        "summary": "1550715",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550715"
      },
      {
        "category": "external",
        "summary": "1550729",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550729"
      },
      {
        "category": "external",
        "summary": "1550732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550732"
      },
      {
        "category": "external",
        "summary": "1550737",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550737"
      },
      {
        "category": "external",
        "summary": "1551627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551627"
      },
      {
        "category": "external",
        "summary": "1551693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551693"
      },
      {
        "category": "external",
        "summary": "1551697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551697"
      },
      {
        "category": "external",
        "summary": "1551699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551699"
      },
      {
        "category": "external",
        "summary": "1552135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552135"
      },
      {
        "category": "external",
        "summary": "1552233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552233"
      },
      {
        "category": "external",
        "summary": "1552780",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552780"
      },
      {
        "category": "external",
        "summary": "1552891",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552891"
      },
      {
        "category": "external",
        "summary": "1552905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552905"
      },
      {
        "category": "external",
        "summary": "1553225",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553225"
      },
      {
        "category": "external",
        "summary": "1553249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553249"
      },
      {
        "category": "external",
        "summary": "1553308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553308"
      },
      {
        "category": "external",
        "summary": "1553331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553331"
      },
      {
        "category": "external",
        "summary": "1553337",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553337"
      },
      {
        "category": "external",
        "summary": "1553364",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553364"
      },
      {
        "category": "external",
        "summary": "1553465",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553465"
      },
      {
        "category": "external",
        "summary": "1553473",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553473"
      },
      {
        "category": "external",
        "summary": "1554533",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554533"
      },
      {
        "category": "external",
        "summary": "1554543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554543"
      },
      {
        "category": "external",
        "summary": "1554900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554900"
      },
      {
        "category": "external",
        "summary": "1555487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555487"
      },
      {
        "category": "external",
        "summary": "1556814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556814"
      },
      {
        "category": "external",
        "summary": "1557025",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557025"
      },
      {
        "category": "external",
        "summary": "1557130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
      },
      {
        "category": "external",
        "summary": "1558032",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558032"
      },
      {
        "category": "external",
        "summary": "1558039",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558039"
      },
      {
        "category": "external",
        "summary": "1558047",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558047"
      },
      {
        "category": "external",
        "summary": "1558076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558076"
      },
      {
        "category": "external",
        "summary": "1558595",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558595"
      },
      {
        "category": "external",
        "summary": "1558622",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558622"
      },
      {
        "category": "external",
        "summary": "1559551",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559551"
      },
      {
        "category": "external",
        "summary": "1559553",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559553"
      },
      {
        "category": "external",
        "summary": "1560097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560097"
      },
      {
        "category": "external",
        "summary": "1560099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560099"
      },
      {
        "category": "external",
        "summary": "1560693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560693"
      },
      {
        "category": "external",
        "summary": "1561077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561077"
      },
      {
        "category": "external",
        "summary": "1562773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562773"
      },
      {
        "category": "external",
        "summary": "1562775",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562775"
      },
      {
        "category": "external",
        "summary": "1562798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562798"
      },
      {
        "category": "external",
        "summary": "1563492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
      },
      {
        "category": "external",
        "summary": "1563721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563721"
      },
      {
        "category": "external",
        "summary": "1563741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563741"
      },
      {
        "category": "external",
        "summary": "1564264",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564264"
      },
      {
        "category": "external",
        "summary": "1564454",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564454"
      },
      {
        "category": "external",
        "summary": "1565157",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565157"
      },
      {
        "category": "external",
        "summary": "1565162",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565162"
      },
      {
        "category": "external",
        "summary": "1565169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565169"
      },
      {
        "category": "external",
        "summary": "1565248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565248"
      },
      {
        "category": "external",
        "summary": "1565342",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565342"
      },
      {
        "category": "external",
        "summary": "1565358",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565358"
      },
      {
        "category": "external",
        "summary": "1565362",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565362"
      },
      {
        "category": "external",
        "summary": "1565364",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565364"
      },
      {
        "category": "external",
        "summary": "1565365",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565365"
      },
      {
        "category": "external",
        "summary": "1565366",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565366"
      },
      {
        "category": "external",
        "summary": "1565389",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565389"
      },
      {
        "category": "external",
        "summary": "1565403",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565403"
      },
      {
        "category": "external",
        "summary": "1565414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565414"
      },
      {
        "category": "external",
        "summary": "1565678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565678"
      },
      {
        "category": "external",
        "summary": "1565724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565724"
      },
      {
        "category": "external",
        "summary": "1565760",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565760"
      },
      {
        "category": "external",
        "summary": "1565835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565835"
      },
      {
        "category": "external",
        "summary": "1565862",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
      },
      {
        "category": "external",
        "summary": "1566256",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566256"
      },
      {
        "category": "external",
        "summary": "1566528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566528"
      },
      {
        "category": "external",
        "summary": "1566746",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566746"
      },
      {
        "category": "external",
        "summary": "1567983",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567983"
      },
      {
        "category": "external",
        "summary": "1568016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568016"
      },
      {
        "category": "external",
        "summary": "1568042",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568042"
      },
      {
        "category": "external",
        "summary": "1568045",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568045"
      },
      {
        "category": "external",
        "summary": "1568084",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568084"
      },
      {
        "category": "external",
        "summary": "1568159",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568159"
      },
      {
        "category": "external",
        "summary": "1568168",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568168"
      },
      {
        "category": "external",
        "summary": "1568576",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568576"
      },
      {
        "category": "external",
        "summary": "1568603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568603"
      },
      {
        "category": "external",
        "summary": "1569079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569079"
      },
      {
        "category": "external",
        "summary": "1569100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569100"
      },
      {
        "category": "external",
        "summary": "1569104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569104"
      },
      {
        "category": "external",
        "summary": "1569118",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569118"
      },
      {
        "category": "external",
        "summary": "1569127",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569127"
      },
      {
        "category": "external",
        "summary": "1569171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569171"
      },
      {
        "category": "external",
        "summary": "1569179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569179"
      },
      {
        "category": "external",
        "summary": "1569230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569230"
      },
      {
        "category": "external",
        "summary": "1569237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569237"
      },
      {
        "category": "external",
        "summary": "1569241",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569241"
      },
      {
        "category": "external",
        "summary": "1570060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570060"
      },
      {
        "category": "external",
        "summary": "1570951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570951"
      },
      {
        "category": "external",
        "summary": "1570990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570990"
      },
      {
        "category": "external",
        "summary": "1571311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571311"
      },
      {
        "category": "external",
        "summary": "1572621",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572621"
      },
      {
        "category": "external",
        "summary": "1572719",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572719"
      },
      {
        "category": "external",
        "summary": "1573540",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573540"
      },
      {
        "category": "external",
        "summary": "1574155",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574155"
      },
      {
        "category": "external",
        "summary": "1574571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574571"
      },
      {
        "category": "external",
        "summary": "1574615",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574615"
      },
      {
        "category": "external",
        "summary": "1576101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576101"
      },
      {
        "category": "external",
        "summary": "1578575",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578575"
      },
      {
        "category": "external",
        "summary": "1578853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578853"
      },
      {
        "category": "external",
        "summary": "1578866",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578866"
      },
      {
        "category": "external",
        "summary": "1581387",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581387"
      },
      {
        "category": "external",
        "summary": "1583711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583711"
      },
      {
        "category": "external",
        "summary": "1583790",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583790"
      },
      {
        "category": "external",
        "summary": "1584187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584187"
      },
      {
        "category": "external",
        "summary": "1584688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584688"
      },
      {
        "category": "external",
        "summary": "1589834",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589834"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1972.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T11:48:52+00:00",
      "generator": {
        "date": "2024-11-22T11:48:52+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2018:1972",
      "initial_release_date": "2018-06-25T14:17:26+00:00",
      "revision_history": [
        {
          "date": "2018-06-25T14:17:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2018-06-25T14:17:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T11:48:52+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudForms Management Engine 5.8",
                "product": {
                  "name": "CloudForms Management Engine 5.8",
                  "product_id": "7Server-RH7-CFME-5.8",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat CloudForms"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
                  "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
                  "product_id": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.7-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
                "product": {
                  "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
                  "product_id": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.7-1.el7at?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.4.5-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-0:5.8.4.5-1.el7cf.x86_64",
                  "product_id": "cfme-0:5.8.4.5-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
                  "product_id": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.4.5-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
                  "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.4.5-1.el7cf?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
                "product": {
                  "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
                  "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-paramiko-0:2.1.1-4.el7.src",
                "product": {
                  "name": "python-paramiko-0:2.1.1-4.el7.src",
                  "product_id": "python-paramiko-0:2.1.1-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-0:2.4.4.0-1.el7ae.src",
                "product": {
                  "name": "ansible-0:2.4.4.0-1.el7ae.src",
                  "product_id": "ansible-0:2.4.4.0-1.el7ae.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.8.4.5-1.el7cf.src",
                "product": {
                  "name": "cfme-0:5.8.4.5-1.el7cf.src",
                  "product_id": "cfme-0:5.8.4.5-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
                "product": {
                  "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
                  "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
                "product": {
                  "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
                  "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
                "product": {
                  "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
                  "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-paramiko-0:2.1.1-4.el7.noarch",
                "product": {
                  "name": "python-paramiko-0:2.1.1-4.el7.noarch",
                  "product_id": "python-paramiko-0:2.1.1-4.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-0:2.4.4.0-1.el7ae.noarch",
                "product": {
                  "name": "ansible-0:2.4.4.0-1.el7ae.noarch",
                  "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch"
        },
        "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src"
        },
        "product_reference": "ansible-0:2.4.4.0-1.el7ae.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64"
        },
        "product_reference": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src"
        },
        "product_reference": "cfme-0:5.8.4.5-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64"
        },
        "product_reference": "cfme-0:5.8.4.5-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src"
        },
        "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64"
        },
        "product_reference": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src"
        },
        "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64"
        },
        "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch"
        },
        "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src"
        },
        "product_reference": "python-paramiko-0:2.1.1-4.el7.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch"
        },
        "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src"
        },
        "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
          "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Graham Mainwaring"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2018-1101",
      "cwe": {
        "id": "CWE-266",
        "name": "Incorrect Privilege Assignment"
      },
      "discovery_date": "2018-04-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1563492"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
          "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
          "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
          "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-1101"
        },
        {
          "category": "external",
          "summary": "RHBZ#1563492",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101"
        }
      ],
      "release_date": "2018-04-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-06-25T14:17:26+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
            "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:1972"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
            "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Simon Vikstr\u00f6m"
          ]
        }
      ],
      "cve": "CVE-2018-1104",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-04-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1565862"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "ansible-tower: Remote code execution by users with access to define variables in job templates",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
          "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
          "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
          "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-1104"
        },
        {
          "category": "external",
          "summary": "RHBZ#1565862",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
        }
      ],
      "release_date": "2018-04-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-06-25T14:17:26+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
            "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:1972"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
            "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "ansible-tower: Remote code execution by users with access to define variables in job templates"
    },
    {
      "cve": "CVE-2018-7750",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2018-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1557130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "python-paramiko: Authentication bypass in transport.py",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
          "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
          "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
          "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
          "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
          "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-7750"
        },
        {
          "category": "external",
          "summary": "RHBZ#1557130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750"
        }
      ],
      "release_date": "2018-03-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-06-25T14:17:26+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
            "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:1972"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
            "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
            "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
            "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
            "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "python-paramiko: Authentication bypass in transport.py"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…