Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 19 Aug 2014 16:18:05 -0400
From: Tristan Cacqueray <tristan.cacqueray@...vance.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2014-027] Persistent XSS in Horizon Host Aggregates interface
 (CVE-2014-3594)

OpenStack Security Advisory: 2014-027
CVE: CVE-2014-3594
Date: August 19, 2014
Title: Persistent XSS in Horizon Host Aggregates interface
Reporters: Dennis Felsch and Mario Heiderich (Ruhr-University Bochum)
Products: Horizon
Versions: up to 2013.2.3, and 2014.1 versions up to 2014.1.2

Description:
Dennis Felsch and Mario Heiderich from the Horst Görtz Institute for
IT-Security, Ruhr-University Bochum reported a persistent XSS in
Horizon. A malicious administrator may conduct a persistent XSS attack
by registering a malicious host aggregate in Horizon Host Aggregate
interface. Once executed in a legitimate context this attack may reveal
another admin token, potentially resulting in a lateral privilege
escalation. All Horizon setups are affected.

Juno (development branch) fix:
https://review.openstack.org/115310

Icehouse fix:
https://review.openstack.org/115311

Havana fix:
https://review.openstack.org/115313

Notes:
This fix will be included in the Juno-3 development milestone and in
future 2013.2.4 and 2014.1.3 releases.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3594
https://launchpad.net/bugs/1349491

-- 
Tristan Cacqueray
OpenStack Vulnerability Management Team




[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ