Bugzilla – Bug 885588
VUL-0: CVE-2014-3473: openstack-dashboard: Multiple XSS Vulnerabilities in Horizon
Last modified: 2015-02-19 01:50:30 UTC
Created attachment 597110 [details] patch for juno CVE-2014-3473, CVE-2014-3474 and CVE-2014-3475 This is an advance warning of a vulnerability discovered in OpenStack, to give you, as downstream stakeholders, a chance to coordinate the release of fixes and reduce the vulnerability window. Please treat the following information as confidential until the proposed public disclosure date. Title: Multiple XSS vulnerabilities in Horizon Reporter: Jason Hullinger (HP), Craig Lorentzen (Cisco), Michael Xin (Rackspace) Products: Horizon Versions: up to 2013.2.3, and 2014.1 Description: Jason Hullinger from Hewlett Packard, Craig Lorentzen from Cisco and Michael Xin from Rackspace reported 3 cross-site scripting (XSS) vulnerabilities in Horizon. A malicious Orchestration template owner or catalog may conduct an XSS attack once a corrupted template is used in the Orchestration/Stack section of Horizon (CVE-2014-3473). A malicious Horizon user may store an XSS attack by creating a network with a corrupted name (CVE-2014-3474). A malicious Horizon administrator may store an XSS attack by creating a user with a corrupted email address (CVE-2014-3475). Once executed in a legitimate context these attacks may result in potential asset stealing (horizon user/admin access credentials, VMs/Network configuration/management, tenants' confidential information, etc.). All Horizon setups are affected. Proposed patch: See attached patches. Unless a flaw is discovered in them, these patches will be merged to stable/havana, stable/icehouse and master (Juno development branch) on the public disclosure date. CVE: CVE-2014-3473, CVE-2014-3474 and CVE-2014-3475 Proposed public disclosure date/time: 2014-07-08, 1500UTC Please do not make the issue public (or release public patches) before this coordinated embargo date. Regards, -- Tristan Cacqueray OpenStack Vulnerability Management Team
bugbot adjusting priority
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2014-07-21. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/58190
Affected packages: SLE-11-SP2-PRODUCTS: openstack-dashboard SLE-11-SP3: openstack-dashboard SLE-11-SP3-CLOUD4: openstack-dashboard SLE-11-SP3-PRODUCTS: openstack-dashboard SLE-11-SP3-UPTU: openstack-dashboard
not yet landed in Havana https://review.openstack.org/#/q/Ic8a92e69f66c2d265a802f350e30f091181aa42e,n,z
This is an autogenerated message for OBS integration: This bug (885588) was mentioned in https://build.opensuse.org/request/show/265000 13.1 / openstack-dashboard
released
openSUSE-SU-2015:0078-1: An update that fixes 7 vulnerabilities is now available. Category: security (moderate) Bug References: 852175,869696,871855,885588,891815,908199 CVE References: CVE-2013-6858,CVE-2014-0157,CVE-2014-3473,CVE-2014-3474,CVE-2014-3475,CVE-2014-3594,CVE-2014-8124 Sources used: openSUSE 13.1 (src): openstack-dashboard-2013.2.5.dev2.g9ee7273-4.1, python-django_openstack_auth-1.1.3-4.1