[OSSA 2014-023] Persistent XSS in OpenStack Havana UI for Network Name (CVE-2014-3474)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Dashboard (Horizon) |
Fix Released
|
High
|
Julie Pichon | ||
Havana |
Fix Released
|
Undecided
|
Unassigned | ||
Icehouse |
Fix Released
|
Undecided
|
Unassigned | ||
OpenStack Security Advisory |
Fix Released
|
High
|
Jeremy Stanley |
Bug Description
Received 2014-05-20 18:52:34 UTC via encrypted E-mail from "Craig Lorentzen (crlorent)" <email address hidden>:
Hello Jeremy,
This is Craig Lorentzen from the Product Security Incident Response Team
(PSIRT) at Cisco Systems. The purpose of this email is to disclose to
you a vulnerability that was found during testing of a Cisco Product
using OpenStack. Below please find the original discoverer's notes.
Please let us know if there is anything else you need regarding this.
Please also provide a tracking number for our records.
-----
Headline: Persistent XSS in OpenStack Havana UI for Network Name
Platforms: OpenStack Horizon
Versions: Havana
CVSS Score: 9.0
CVSS Vector: AV:N/AC:
CWE Tags:
The Openstack Horizon user interface is vulnerable to XSS. The Network Name
parameter is not properly sanitized to prevent javascript injection, leading
to persistent XSS.
Steps to reproduce:
1) Create a new network. Use:
<script>
for the network name. Disable both Subnet -> Create Subnet and Subnet Detail ->
Enable DHCP. Choose Create.
2) Select Instances -> Launch Instance. Receive alert.
Recommendations:
- Sanitize the rendering of "Network Name" string to prevent XSS.
- Consider utilizing Content Security Policy (CSP). This can be used to prevent
inline javascript from executing & only load Javascript files from approved
domains. This would prevent XSS, even in scenarios where user input is not
properly sanitized.
-----
Thank You,
Craig Lorentzen
Incident Manager
Cisco Product Security Incident Response Team
Security Research and Operations
Office: 919.574.5680
Email: <email address hidden>
SIO: http://
PGP: 0x30A6C8ED
Related branches
CVE References
Changed in ossa: | |
status: | New → Incomplete |
Changed in horizon: | |
assignee: | nobody → Julie Pichon (jpichon) |
Changed in ossa: | |
status: | Confirmed → Triaged |
summary: |
- Persistent XSS in OpenStack Havana UI for Network Name + Persistent XSS in OpenStack Havana UI for Network Name (CVE-2014-3474) |
Changed in ossa: | |
status: | Triaged → In Progress |
information type: | Private Security → Public Security |
summary: |
- Persistent XSS in OpenStack Havana UI for Network Name (CVE-2014-3474) + [OSSA 2014-023] Persistent XSS in OpenStack Havana UI for Network Name + (CVE-2014-3474) |
Changed in ossa: | |
status: | Fix Committed → Fix Released |
Changed in horizon: | |
milestone: | none → juno-2 |
status: | Fix Committed → Fix Released |
Changed in horizon: | |
milestone: | juno-2 → 2014.2 |
Tested and this is also an issue on master.