A lack of access control was found in the message queues maintained by Satellite’s QPID broker and used by katello-agent. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.
On Satellite Server follow the instructions below:
acl-file=qpid_acls.acl
acl allow katello_agent@QPID create queue
acl allow katello_agent@QPID consume queue
acl allow katello_agent@QPID access exchange
acl allow katello_agent@QPID access queue
acl allow katello_agent@QPID publish exchange routingkey=pulp.task
acl allow katello_agent@QPID publish exchange name=qmf.default.direct
acl allow katello_agent@QPID access method name=create
acl deny-log katello_agent@QPID access method name=*
acl deny-log katello_agent@QPID all all
acl allow all all
connector {
name: broker
host: localhost
port: 5671
sasl-mechanisms: PLAIN
sasl-username: katello_agent
sasl-password: katello_agent
role: route-container
ssl-profile: client
idle-timeout-seconds: 0
}
These ACLs will prevent clients to redirect or move messages to various queues which is the nature of the CVE.
All other behavior will be unchanged (acl allow all all) which is the current baseline.