Date: Fri, 13 Mar 2015 13:46:57 -0400 From: Tristan Cacqueray <tristan.cacqueray@...vance.com> To: oss-security@...ts.openwall.com Subject: [OSSA 2015-005] Nova console Cross-Site WebSocket hijacking (CVE-2015-0259) ========================================================== OSSA-2015-005: Nova console Cross-Site WebSocket hijacking ========================================================== :Date: March 13, 2015 :CVE: CVE-2015-0259 Affects ~~~~~~~ - Nova: up to 2014.1.3 and 2014.2 versions up to 2014.2.2 Description ~~~~~~~~~~~ Brian Manifold from Cisco and Paul McMillan from Nebula reported a vulnerability in Nova console websocket. By tricking an authenticated user into visiting a malicious URL, a remote attacker or a man in the middle may exploit a cross-site-websocket-hijacking vulnerability resulting in potential hijack of consoles where the user is still logged in. Only Nova setups with vnc or spice enabled are affected. Patches ~~~~~~~ - https://review.openstack.org/163035 (Icehouse) - https://review.openstack.org/163034 (Juno) - https://review.openstack.org/163033 (Kilo) Credits ~~~~~~~ - Brian Manifold from Cisco (CVE-2015-0259) - Paul McMillan from Nebula (CVE-2015-0259) References ~~~~~~~~~~ - https://launchpad.net/bugs/1409142 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0259 Notes ~~~~~ - This fix is included in 2014.1.4 (icehouse) release and it will be included in the kilo-3 development milestone and in the future 2014.2.3 (juno) release. -- Tristan Cacqueray OpenStack Vulnerability Management Team Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.