The default configuration of broker.conf in Red Hat OpenShift Enterprise 2.x before 2.1 has a password of "mooo" for a Mongo account, which allows remote attackers to hijack the broker by providing this password, related to the openshift.sh script in Openshift Extras before 20130920. NOTE: this may overlap CVE-2013-4253 and CVE-2013-4281.
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
Link | Tags |
---|---|
https://github.com/openshift/openshift-extras/blob/master/README.md | third party advisory |
http://openwall.com/lists/oss-security/2014/06/05/19 | mailing list patch exploit third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1097008 | issue tracking vendor advisory |
https://rhn.redhat.com/errata/RHSA-2014-0487.html | vendor advisory |
http://www.securityfocus.com/bid/67657 | vdb entry third party advisory |