Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3f951397-fbcc-44c5-b733-01a686a7df32@gmail.com>
Date: Tue, 5 May 2026 08:01:06 -0700
From: Goutham Pacha Ravi <gouthampravi@...il.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA-2026-009] Horizon: Unauthenticated session flood via login
 redirect storage (CVE-2026-43002)

=========================================================================
OSSA-2026-009: Unauthenticated session flood via login redirect storage
=========================================================================

:Date: April 27, 2026
:CVE: CVE-2026-43002


Affects
~~~~~~~
- Horizon: >=25.6.0 <25.7.3


Description
~~~~~~~~~~~
Erichen (Institute of Computing Technology, Chinese Academy of
Sciences) reported a denial of service vulnerability in Horizon.
The login view stores a post-login redirect URL in the server-side
session before the user authenticates. Because each unauthenticated
request without a session cookie triggers a new persistent session
entry, an attacker can exhaust the session storage backend
(Memcached, Redis, or database) by sending repeated requests to
``/auth/login/?next=URL``. When the backend reaches capacity, legitimate
sessions are evicted, logging out administrators and preventing them
from accessing the dashboard. This is a regression of CVE-2014-8124.
Deployments running Horizon from the 2026.1 (Gazpacho) release
series with default session configuration are affected. Earlier
release series do not contain the vulnerable code.


Patches
~~~~~~~
- https://review.opendev.org/c/openstack/horizon/+/986834 (2026.1/gazpacho)


Credits
~~~~~~~
- Erichen from Institute of Computing Technology, Chinese Academy of 
Sciences (CVE-2026-43002)


References
~~~~~~~~~~
- https://launchpad.net/bugs/2150331
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43002


Notes
~~~~~
- This vulnerability was introduced in commit 3e2ff4e06 (Horizon
   25.6.0) and only affects the 2026.1 (Gazpacho) release series.
   Earlier releases are not affected.
- This is a regression of CVE-2014-8124. The original middleware-level
   fix remains effective, but the new view-layer session write bypasses
   it.

--
Goutham Pacha Ravi (gouthamr)
OpenStack Vulnerability Management Team
https://security.openstack.org/vmt.html

Download attachment "OpenPGP_0x0638DAD3B82C3988.asc" of type "application/pgp-keys" (3241 bytes)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (841 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.