Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-3473
Vulnerability from cvelistv5
Published
2014-10-31 15:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2014/07/08/6 | Mailing List, Patch | |
secalert@redhat.com | http://www.securityfocus.com/bid/68459 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugs.launchpad.net/horizon/+bug/1308727 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/07/08/6 | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/68459 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.launchpad.net/horizon/+bug/1308727 | Issue Tracking, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140708 [OSSA 2014-023] Multiple XSS vulnerabilities in Horizon (CVE-2014-3473, CVE-2014-3474, and CVE-2014-3475)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "name": "68459", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68459" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/horizon/+bug/1308727" }, { "name": "openSUSE-SU-2015:0078", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-16T17:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20140708 [OSSA 2014-023] Multiple XSS vulnerabilities in Horizon (CVE-2014-3473, CVE-2014-3474, and CVE-2014-3475)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "name": "68459", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68459" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/horizon/+bug/1308727" }, { "name": "openSUSE-SU-2015:0078", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3473", "datePublished": "2014-10-31T15:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2013.2\", \"versionEndExcluding\": \"2013.2.4\", \"matchCriteriaId\": \"8AF1648D-62B1-4F76-8A20-2018978EE155\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2014.1\", \"versionEndExcluding\": \"2014.1.2\", \"matchCriteriaId\": \"F9660BD9-614A-416E-BF0C-F254DD95B6C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A3DF8E5-464D-46CC-B96C-B7CD91298C42\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A10BC294-9196-425F-9FB0-B1625465B47F\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de XSS en la secci\\u00f3n Orchestration/Stack en el cuadro de mandos Horizon Orchestration en OpenStack Dashboard (Horizon) anterior a 2013.2.4, 2014.1 anterior a 2014.1.2, y Juno anterior a Juno-2, cuando utilizado con Heat, permite a due\\u00f1os o cat\\u00e1logos de plantillas Orchestration inyectar secuencias de comandos web o HTML arbitrarios a trav\\u00e9s de una plantilla manipulada.\"}]", "id": "CVE-2014-3473", "lastModified": "2024-11-21T02:08:10.973", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-10-31T15:55:03.743", "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2014/07/08/6\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/68459\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugs.launchpad.net/horizon/+bug/1308727\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2014/07/08/6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/68459\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugs.launchpad.net/horizon/+bug/1308727\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2014-3473\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-10-31T15:55:03.743\",\"lastModified\":\"2024-11-21T02:08:10.973\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en la secci\u00f3n Orchestration/Stack en el cuadro de mandos Horizon Orchestration en OpenStack Dashboard (Horizon) anterior a 2013.2.4, 2014.1 anterior a 2014.1.2, y Juno anterior a Juno-2, cuando utilizado con Heat, permite a due\u00f1os o cat\u00e1logos de plantillas Orchestration inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una plantilla manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2013.2\",\"versionEndExcluding\":\"2013.2.4\",\"matchCriteriaId\":\"8AF1648D-62B1-4F76-8A20-2018978EE155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2014.1\",\"versionEndExcluding\":\"2014.1.2\",\"matchCriteriaId\":\"F9660BD9-614A-416E-BF0C-F254DD95B6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3DF8E5-464D-46CC-B96C-B7CD91298C42\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/07/08/6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/68459\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.launchpad.net/horizon/+bug/1308727\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/07/08/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/68459\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.launchpad.net/horizon/+bug/1308727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
rhsa-2014_1188
Vulnerability from csaf_redhat
Published
2014-09-15 05:52
Modified
2024-11-22 08:23
Summary
Red Hat Security Advisory: python-django-horizon security update
Notes
Topic
Updated python-django-horizon packages that fix multiple security issues
are now available for Red Hat Enterprise Linux OpenStack Platform 4.0.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
OpenStack Dashboard (horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.
A cross-site scripting (XSS) flaw was found in the way orchestration
templates were handled. An owner of such a template could use this flaw to
perform XSS attacks against other Horizon users. (CVE-2014-3473)
It was found that network names were not sanitized. A malicious user could
use this flaw to perform XSS attacks against other Horizon users by
creating a network with a specially crafted name. (CVE-2014-3474)
It was found that certain email addresses were not sanitized. An
administrator could use this flaw to perform XSS attacks against other
Horizon users by storing an email address that has a specially crafted
name. (CVE-2014-3475)
A persistent cross-site scripting (XSS) flaw was found in the horizon host
aggregate interface. A user with sufficient privileges to add a host
aggregate could potentially use this flaw to capture the credentials of
another user. (CVE-2014-3594)
Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the
original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the
original reporter of CVE-2014-3474, Michael Xin from Rackspace as the
original reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich
from the Horst Görtz Institute for IT-Security, Ruhr-University Bochum as
the original reporter of CVE-2014-3594.
All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python-django-horizon packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux OpenStack Platform 4.0.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Dashboard (horizon) provides administrators and users with a\ngraphical interface to access, provision, and automate cloud-based\nresources.\n\nA cross-site scripting (XSS) flaw was found in the way orchestration\ntemplates were handled. An owner of such a template could use this flaw to\nperform XSS attacks against other Horizon users. (CVE-2014-3473)\n\nIt was found that network names were not sanitized. A malicious user could\nuse this flaw to perform XSS attacks against other Horizon users by\ncreating a network with a specially crafted name. (CVE-2014-3474)\n\nIt was found that certain email addresses were not sanitized. An\nadministrator could use this flaw to perform XSS attacks against other\nHorizon users by storing an email address that has a specially crafted\nname. (CVE-2014-3475)\n\nA persistent cross-site scripting (XSS) flaw was found in the horizon host\naggregate interface. A user with sufficient privileges to add a host\naggregate could potentially use this flaw to capture the credentials of\nanother user. (CVE-2014-3594)\n\nRed Hat would like to thank the OpenStack project for reporting these\nissues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the\noriginal reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the\noriginal reporter of CVE-2014-3474, Michael Xin from Rackspace as the\noriginal reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich\nfrom the Horst G\u00f6rtz Institute for IT-Security, Ruhr-University Bochum as\nthe original reporter of CVE-2014-3594.\n\nAll python-django-horizon users are advised to upgrade to these updated\npackages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1188", "url": "https://access.redhat.com/errata/RHSA-2014:1188" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "1129774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129774" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1188.json" } ], "title": "Red Hat Security Advisory: python-django-horizon security update", "tracking": { "current_release_date": "2024-11-22T08:23:05+00:00", "generator": { "date": "2024-11-22T08:23:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1188", "initial_release_date": "2014-09-15T05:52:09+00:00", "revision_history": [ { "date": "2014-09-15T05:52:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-15T05:52:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:23:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product_id": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2013.2.3-3.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product_id": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product": { "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product_id": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard-theme@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product": { "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product_id": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon-doc@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product": { "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product_id": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard@2013.2.3-3.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src" }, "product_reference": "python-django-horizon-0:2013.2.3-3.el6ost.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3473", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3473", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3474", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3474" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3474", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3475", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3475" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3475", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] } ], "cve": "CVE-2014-3594", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1129774" } ], "notes": [ { "category": "description", "text": "A persistent cross-site scripting (XSS) flaw was found in the horizon host aggregate interface. A user with sufficient privileges to add a host aggregate could potentially use this flaw to capture the credentials of another user.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: persistent XSS in Horizon Host Aggregates interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3594" }, { "category": "external", "summary": "RHBZ#1129774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129774" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3594", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3594" } ], "release_date": "2014-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: persistent XSS in Horizon Host Aggregates interface" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-8578", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Groups panel in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-3475.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8578" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8578" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" } ] }
RHSA-2014:0939
Vulnerability from csaf_redhat
Published
2014-07-24 17:21
Modified
2024-11-22 08:17
Summary
Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update
Notes
Topic
Updated python-django-horizon packages that fix three security issues,
multiple bugs, and add an enhancement are now available for Red Hat
Enterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise
Linux 7.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
OpenStack Dashboard (Horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.
A cross-site scripting (XSS) flaw was found in the way orchestration
templates were handled. An owner of such a template could use this flaw to
perform XSS attacks against other Horizon users. (CVE-2014-3473)
It was found that network names were not sanitized. A malicious user could
use this flaw to perform XSS attacks against other Horizon users by
creating a network with a specially crafted name. (CVE-2014-3474)
It was found that certain email addresses were not sanitized. An
administrator could use this flaw to perform XSS attacks against other
Horizon users by storing an email address that has a specially crafted
name. (CVE-2014-3475)
Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the
original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the
original reporter of CVE-2014-3474, and Michael Xin from Rackspace as the
original reporter of CVE-2014-3475.
This update also fixes the following bugs:
* The python-django-horizon package has been updated to upstream version
2014.1.1. This includes several important bug fixes, including an issue
that prevented access to Swift pseudo-folders through the Dashboard, and
an issue that prevented instances from being launched when using the French
locale (or other locales that use apostrophes). (BZ#1117901)
Lastly, this update also adds the following enhancement:
* A new "Update" option has been added for OpenStack Networking VPNaaS
support for Dashboard. This makes it easier to use Virtual Private Network
as a Service (VPNaaS). (BZ#1042030)
All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues and add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python-django-horizon packages that fix three security issues,\nmultiple bugs, and add an enhancement are now available for Red Hat\nEnterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise\nLinux 7.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Dashboard (Horizon) provides administrators and users with a\ngraphical interface to access, provision, and automate cloud-based\nresources.\n\nA cross-site scripting (XSS) flaw was found in the way orchestration\ntemplates were handled. An owner of such a template could use this flaw to\nperform XSS attacks against other Horizon users. (CVE-2014-3473)\n\nIt was found that network names were not sanitized. A malicious user could\nuse this flaw to perform XSS attacks against other Horizon users by\ncreating a network with a specially crafted name. (CVE-2014-3474)\n\nIt was found that certain email addresses were not sanitized. An\nadministrator could use this flaw to perform XSS attacks against other\nHorizon users by storing an email address that has a specially crafted\nname. (CVE-2014-3475)\n\nRed Hat would like to thank the OpenStack project for reporting these\nissues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the\noriginal reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the\noriginal reporter of CVE-2014-3474, and Michael Xin from Rackspace as the\noriginal reporter of CVE-2014-3475.\n\nThis update also fixes the following bugs:\n\n* The python-django-horizon package has been updated to upstream version\n2014.1.1. This includes several important bug fixes, including an issue\nthat prevented access to Swift pseudo-folders through the Dashboard, and\nan issue that prevented instances from being launched when using the French\nlocale (or other locales that use apostrophes). (BZ#1117901)\n\nLastly, this update also adds the following enhancement:\n\n* A new \"Update\" option has been added for OpenStack Networking VPNaaS\nsupport for Dashboard. This makes it easier to use Virtual Private Network\nas a Service (VPNaaS). (BZ#1042030)\n\nAll python-django-horizon users are advised to upgrade to these updated\npackages, which correct these issues and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0939", "url": "https://access.redhat.com/errata/RHSA-2014:0939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1042030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1042030" }, { "category": "external", "summary": "1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "1117901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1117901" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0939.json" } ], "title": "Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:17:42+00:00", "generator": { "date": "2024-11-22T08:17:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0939", "initial_release_date": "2014-07-24T17:21:49+00:00", "revision_history": [ { "date": "2014-07-24T17:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-07-24T17:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:17:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product": { "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product_id": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard-theme@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product": { "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product_id": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product": { "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product_id": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon-doc@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product_id": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2014.1.1-2.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product_id": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2014.1.1-2.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src" }, "product_reference": "python-django-horizon-0:2014.1.1-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3473", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3473", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3474", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3474" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3474", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3475", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3475" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3475", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-8578", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Groups panel in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-3475.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8578" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8578" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" } ] }
RHSA-2014:1188
Vulnerability from csaf_redhat
Published
2014-09-15 05:52
Modified
2024-11-22 08:23
Summary
Red Hat Security Advisory: python-django-horizon security update
Notes
Topic
Updated python-django-horizon packages that fix multiple security issues
are now available for Red Hat Enterprise Linux OpenStack Platform 4.0.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
OpenStack Dashboard (horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.
A cross-site scripting (XSS) flaw was found in the way orchestration
templates were handled. An owner of such a template could use this flaw to
perform XSS attacks against other Horizon users. (CVE-2014-3473)
It was found that network names were not sanitized. A malicious user could
use this flaw to perform XSS attacks against other Horizon users by
creating a network with a specially crafted name. (CVE-2014-3474)
It was found that certain email addresses were not sanitized. An
administrator could use this flaw to perform XSS attacks against other
Horizon users by storing an email address that has a specially crafted
name. (CVE-2014-3475)
A persistent cross-site scripting (XSS) flaw was found in the horizon host
aggregate interface. A user with sufficient privileges to add a host
aggregate could potentially use this flaw to capture the credentials of
another user. (CVE-2014-3594)
Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the
original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the
original reporter of CVE-2014-3474, Michael Xin from Rackspace as the
original reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich
from the Horst Görtz Institute for IT-Security, Ruhr-University Bochum as
the original reporter of CVE-2014-3594.
All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python-django-horizon packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux OpenStack Platform 4.0.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Dashboard (horizon) provides administrators and users with a\ngraphical interface to access, provision, and automate cloud-based\nresources.\n\nA cross-site scripting (XSS) flaw was found in the way orchestration\ntemplates were handled. An owner of such a template could use this flaw to\nperform XSS attacks against other Horizon users. (CVE-2014-3473)\n\nIt was found that network names were not sanitized. A malicious user could\nuse this flaw to perform XSS attacks against other Horizon users by\ncreating a network with a specially crafted name. (CVE-2014-3474)\n\nIt was found that certain email addresses were not sanitized. An\nadministrator could use this flaw to perform XSS attacks against other\nHorizon users by storing an email address that has a specially crafted\nname. (CVE-2014-3475)\n\nA persistent cross-site scripting (XSS) flaw was found in the horizon host\naggregate interface. A user with sufficient privileges to add a host\naggregate could potentially use this flaw to capture the credentials of\nanother user. (CVE-2014-3594)\n\nRed Hat would like to thank the OpenStack project for reporting these\nissues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the\noriginal reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the\noriginal reporter of CVE-2014-3474, Michael Xin from Rackspace as the\noriginal reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich\nfrom the Horst G\u00f6rtz Institute for IT-Security, Ruhr-University Bochum as\nthe original reporter of CVE-2014-3594.\n\nAll python-django-horizon users are advised to upgrade to these updated\npackages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1188", "url": "https://access.redhat.com/errata/RHSA-2014:1188" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "1129774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129774" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1188.json" } ], "title": "Red Hat Security Advisory: python-django-horizon security update", "tracking": { "current_release_date": "2024-11-22T08:23:05+00:00", "generator": { "date": "2024-11-22T08:23:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1188", "initial_release_date": "2014-09-15T05:52:09+00:00", "revision_history": [ { "date": "2014-09-15T05:52:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-15T05:52:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:23:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product_id": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2013.2.3-3.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product_id": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product": { "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product_id": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard-theme@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product": { "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product_id": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon-doc@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product": { "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product_id": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard@2013.2.3-3.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src" }, "product_reference": "python-django-horizon-0:2013.2.3-3.el6ost.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3473", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3473", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3474", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3474" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3474", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3475", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3475" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3475", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] } ], "cve": "CVE-2014-3594", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1129774" } ], "notes": [ { "category": "description", "text": "A persistent cross-site scripting (XSS) flaw was found in the horizon host aggregate interface. A user with sufficient privileges to add a host aggregate could potentially use this flaw to capture the credentials of another user.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: persistent XSS in Horizon Host Aggregates interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3594" }, { "category": "external", "summary": "RHBZ#1129774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129774" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3594", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3594" } ], "release_date": "2014-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: persistent XSS in Horizon Host Aggregates interface" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-8578", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Groups panel in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-3475.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8578" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8578" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" } ] }
rhsa-2014:0939
Vulnerability from csaf_redhat
Published
2014-07-24 17:21
Modified
2024-11-22 08:17
Summary
Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update
Notes
Topic
Updated python-django-horizon packages that fix three security issues,
multiple bugs, and add an enhancement are now available for Red Hat
Enterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise
Linux 7.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
OpenStack Dashboard (Horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.
A cross-site scripting (XSS) flaw was found in the way orchestration
templates were handled. An owner of such a template could use this flaw to
perform XSS attacks against other Horizon users. (CVE-2014-3473)
It was found that network names were not sanitized. A malicious user could
use this flaw to perform XSS attacks against other Horizon users by
creating a network with a specially crafted name. (CVE-2014-3474)
It was found that certain email addresses were not sanitized. An
administrator could use this flaw to perform XSS attacks against other
Horizon users by storing an email address that has a specially crafted
name. (CVE-2014-3475)
Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the
original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the
original reporter of CVE-2014-3474, and Michael Xin from Rackspace as the
original reporter of CVE-2014-3475.
This update also fixes the following bugs:
* The python-django-horizon package has been updated to upstream version
2014.1.1. This includes several important bug fixes, including an issue
that prevented access to Swift pseudo-folders through the Dashboard, and
an issue that prevented instances from being launched when using the French
locale (or other locales that use apostrophes). (BZ#1117901)
Lastly, this update also adds the following enhancement:
* A new "Update" option has been added for OpenStack Networking VPNaaS
support for Dashboard. This makes it easier to use Virtual Private Network
as a Service (VPNaaS). (BZ#1042030)
All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues and add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python-django-horizon packages that fix three security issues,\nmultiple bugs, and add an enhancement are now available for Red Hat\nEnterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise\nLinux 7.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Dashboard (Horizon) provides administrators and users with a\ngraphical interface to access, provision, and automate cloud-based\nresources.\n\nA cross-site scripting (XSS) flaw was found in the way orchestration\ntemplates were handled. An owner of such a template could use this flaw to\nperform XSS attacks against other Horizon users. (CVE-2014-3473)\n\nIt was found that network names were not sanitized. A malicious user could\nuse this flaw to perform XSS attacks against other Horizon users by\ncreating a network with a specially crafted name. (CVE-2014-3474)\n\nIt was found that certain email addresses were not sanitized. An\nadministrator could use this flaw to perform XSS attacks against other\nHorizon users by storing an email address that has a specially crafted\nname. (CVE-2014-3475)\n\nRed Hat would like to thank the OpenStack project for reporting these\nissues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the\noriginal reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the\noriginal reporter of CVE-2014-3474, and Michael Xin from Rackspace as the\noriginal reporter of CVE-2014-3475.\n\nThis update also fixes the following bugs:\n\n* The python-django-horizon package has been updated to upstream version\n2014.1.1. This includes several important bug fixes, including an issue\nthat prevented access to Swift pseudo-folders through the Dashboard, and\nan issue that prevented instances from being launched when using the French\nlocale (or other locales that use apostrophes). (BZ#1117901)\n\nLastly, this update also adds the following enhancement:\n\n* A new \"Update\" option has been added for OpenStack Networking VPNaaS\nsupport for Dashboard. This makes it easier to use Virtual Private Network\nas a Service (VPNaaS). (BZ#1042030)\n\nAll python-django-horizon users are advised to upgrade to these updated\npackages, which correct these issues and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0939", "url": "https://access.redhat.com/errata/RHSA-2014:0939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1042030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1042030" }, { "category": "external", "summary": "1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "1117901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1117901" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0939.json" } ], "title": "Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:17:42+00:00", "generator": { "date": "2024-11-22T08:17:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0939", "initial_release_date": "2014-07-24T17:21:49+00:00", "revision_history": [ { "date": "2014-07-24T17:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-07-24T17:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:17:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product": { "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product_id": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard-theme@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product": { "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product_id": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product": { "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product_id": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon-doc@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product_id": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2014.1.1-2.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product_id": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2014.1.1-2.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src" }, "product_reference": "python-django-horizon-0:2014.1.1-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3473", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3473", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3474", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3474" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3474", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3475", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3475" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3475", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-8578", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Groups panel in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-3475.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8578" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8578" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" } ] }
rhsa-2014:1188
Vulnerability from csaf_redhat
Published
2014-09-15 05:52
Modified
2024-11-22 08:23
Summary
Red Hat Security Advisory: python-django-horizon security update
Notes
Topic
Updated python-django-horizon packages that fix multiple security issues
are now available for Red Hat Enterprise Linux OpenStack Platform 4.0.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
OpenStack Dashboard (horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.
A cross-site scripting (XSS) flaw was found in the way orchestration
templates were handled. An owner of such a template could use this flaw to
perform XSS attacks against other Horizon users. (CVE-2014-3473)
It was found that network names were not sanitized. A malicious user could
use this flaw to perform XSS attacks against other Horizon users by
creating a network with a specially crafted name. (CVE-2014-3474)
It was found that certain email addresses were not sanitized. An
administrator could use this flaw to perform XSS attacks against other
Horizon users by storing an email address that has a specially crafted
name. (CVE-2014-3475)
A persistent cross-site scripting (XSS) flaw was found in the horizon host
aggregate interface. A user with sufficient privileges to add a host
aggregate could potentially use this flaw to capture the credentials of
another user. (CVE-2014-3594)
Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the
original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the
original reporter of CVE-2014-3474, Michael Xin from Rackspace as the
original reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich
from the Horst Görtz Institute for IT-Security, Ruhr-University Bochum as
the original reporter of CVE-2014-3594.
All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python-django-horizon packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux OpenStack Platform 4.0.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Dashboard (horizon) provides administrators and users with a\ngraphical interface to access, provision, and automate cloud-based\nresources.\n\nA cross-site scripting (XSS) flaw was found in the way orchestration\ntemplates were handled. An owner of such a template could use this flaw to\nperform XSS attacks against other Horizon users. (CVE-2014-3473)\n\nIt was found that network names were not sanitized. A malicious user could\nuse this flaw to perform XSS attacks against other Horizon users by\ncreating a network with a specially crafted name. (CVE-2014-3474)\n\nIt was found that certain email addresses were not sanitized. An\nadministrator could use this flaw to perform XSS attacks against other\nHorizon users by storing an email address that has a specially crafted\nname. (CVE-2014-3475)\n\nA persistent cross-site scripting (XSS) flaw was found in the horizon host\naggregate interface. A user with sufficient privileges to add a host\naggregate could potentially use this flaw to capture the credentials of\nanother user. (CVE-2014-3594)\n\nRed Hat would like to thank the OpenStack project for reporting these\nissues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the\noriginal reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the\noriginal reporter of CVE-2014-3474, Michael Xin from Rackspace as the\noriginal reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich\nfrom the Horst G\u00f6rtz Institute for IT-Security, Ruhr-University Bochum as\nthe original reporter of CVE-2014-3594.\n\nAll python-django-horizon users are advised to upgrade to these updated\npackages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1188", "url": "https://access.redhat.com/errata/RHSA-2014:1188" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "1129774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129774" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1188.json" } ], "title": "Red Hat Security Advisory: python-django-horizon security update", "tracking": { "current_release_date": "2024-11-22T08:23:05+00:00", "generator": { "date": "2024-11-22T08:23:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1188", "initial_release_date": "2014-09-15T05:52:09+00:00", "revision_history": [ { "date": "2014-09-15T05:52:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-09-15T05:52:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:23:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product_id": "python-django-horizon-0:2013.2.3-3.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2013.2.3-3.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product_id": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product": { "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product_id": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard-theme@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product": { "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product_id": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon-doc@2013.2.3-3.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product": { "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product_id": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard@2013.2.3-3.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "python-django-horizon-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2013.2.3-3.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src" }, "product_reference": "python-django-horizon-0:2013.2.3-3.el6ost.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" }, "product_reference": "python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3473", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3473", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3474", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3474" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3474", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3475", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3475" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3475", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] } ], "cve": "CVE-2014-3594", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1129774" } ], "notes": [ { "category": "description", "text": "A persistent cross-site scripting (XSS) flaw was found in the horizon host aggregate interface. A user with sufficient privileges to add a host aggregate could potentially use this flaw to capture the credentials of another user.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: persistent XSS in Horizon Host Aggregates interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3594" }, { "category": "external", "summary": "RHBZ#1129774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129774" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3594", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3594" } ], "release_date": "2014-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: persistent XSS in Horizon Host Aggregates interface" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-8578", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Groups panel in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-3475.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8578" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8578" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-09-15T05:52:09+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1188" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOS-4.0:openstack-dashboard-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:openstack-dashboard-theme-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.noarch", "6Server-RHOS-4.0:python-django-horizon-0:2013.2.3-3.el6ost.src", "6Server-RHOS-4.0:python-django-horizon-doc-0:2013.2.3-3.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" } ] }
rhsa-2014_0939
Vulnerability from csaf_redhat
Published
2014-07-24 17:21
Modified
2024-11-22 08:17
Summary
Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update
Notes
Topic
Updated python-django-horizon packages that fix three security issues,
multiple bugs, and add an enhancement are now available for Red Hat
Enterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise
Linux 7.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
OpenStack Dashboard (Horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.
A cross-site scripting (XSS) flaw was found in the way orchestration
templates were handled. An owner of such a template could use this flaw to
perform XSS attacks against other Horizon users. (CVE-2014-3473)
It was found that network names were not sanitized. A malicious user could
use this flaw to perform XSS attacks against other Horizon users by
creating a network with a specially crafted name. (CVE-2014-3474)
It was found that certain email addresses were not sanitized. An
administrator could use this flaw to perform XSS attacks against other
Horizon users by storing an email address that has a specially crafted
name. (CVE-2014-3475)
Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the
original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the
original reporter of CVE-2014-3474, and Michael Xin from Rackspace as the
original reporter of CVE-2014-3475.
This update also fixes the following bugs:
* The python-django-horizon package has been updated to upstream version
2014.1.1. This includes several important bug fixes, including an issue
that prevented access to Swift pseudo-folders through the Dashboard, and
an issue that prevented instances from being launched when using the French
locale (or other locales that use apostrophes). (BZ#1117901)
Lastly, this update also adds the following enhancement:
* A new "Update" option has been added for OpenStack Networking VPNaaS
support for Dashboard. This makes it easier to use Virtual Private Network
as a Service (VPNaaS). (BZ#1042030)
All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues and add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python-django-horizon packages that fix three security issues,\nmultiple bugs, and add an enhancement are now available for Red Hat\nEnterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise\nLinux 7.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Dashboard (Horizon) provides administrators and users with a\ngraphical interface to access, provision, and automate cloud-based\nresources.\n\nA cross-site scripting (XSS) flaw was found in the way orchestration\ntemplates were handled. An owner of such a template could use this flaw to\nperform XSS attacks against other Horizon users. (CVE-2014-3473)\n\nIt was found that network names were not sanitized. A malicious user could\nuse this flaw to perform XSS attacks against other Horizon users by\ncreating a network with a specially crafted name. (CVE-2014-3474)\n\nIt was found that certain email addresses were not sanitized. An\nadministrator could use this flaw to perform XSS attacks against other\nHorizon users by storing an email address that has a specially crafted\nname. (CVE-2014-3475)\n\nRed Hat would like to thank the OpenStack project for reporting these\nissues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the\noriginal reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the\noriginal reporter of CVE-2014-3474, and Michael Xin from Rackspace as the\noriginal reporter of CVE-2014-3475.\n\nThis update also fixes the following bugs:\n\n* The python-django-horizon package has been updated to upstream version\n2014.1.1. This includes several important bug fixes, including an issue\nthat prevented access to Swift pseudo-folders through the Dashboard, and\nan issue that prevented instances from being launched when using the French\nlocale (or other locales that use apostrophes). (BZ#1117901)\n\nLastly, this update also adds the following enhancement:\n\n* A new \"Update\" option has been added for OpenStack Networking VPNaaS\nsupport for Dashboard. This makes it easier to use Virtual Private Network\nas a Service (VPNaaS). (BZ#1042030)\n\nAll python-django-horizon users are advised to upgrade to these updated\npackages, which correct these issues and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0939", "url": "https://access.redhat.com/errata/RHSA-2014:0939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1042030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1042030" }, { "category": "external", "summary": "1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "1117901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1117901" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0939.json" } ], "title": "Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:17:42+00:00", "generator": { "date": "2024-11-22T08:17:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0939", "initial_release_date": "2014-07-24T17:21:49+00:00", "revision_history": [ { "date": "2014-07-24T17:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-07-24T17:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:17:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product": { "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product_id": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard-theme@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product": { "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product_id": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-dashboard@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product": { "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product_id": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon-doc@2014.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product_id": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2014.1.1-2.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product_id": "python-django-horizon-0:2014.1.1-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-horizon@2014.1.1-2.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "python-django-horizon-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-0:2014.1.1-2.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src" }, "product_reference": "python-django-horizon-0:2014.1.1-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7", "product_id": "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" }, "product_reference": "python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-5.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3473", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3473", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3474", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3474" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3474", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3474" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3475", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Users panel (admin/users/) in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-8578.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3475" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3475", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3475" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" }, { "acknowledgments": [ { "names": [ "OpenStack project" ] }, { "names": [ "Jason Hullinger" ], "organization": "Hewlett Packard", "summary": "Acknowledged by upstream." }, { "names": [ "Craig Lorentzen" ], "organization": "Cisco", "summary": "Acknowledged by upstream." }, { "names": [ "Michael Xin" ], "organization": "Rackspace", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-8578", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1116090" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the Groups panel in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote administrators to inject arbitrary web script or HTML via a user email address, a different vulnerability than CVE-2014-3475.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-horizon: multiple XSS flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8578" }, { "category": "external", "summary": "RHBZ#1116090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8578" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8578" } ], "release_date": "2014-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-24T17:21:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-5.0:openstack-dashboard-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:openstack-dashboard-theme-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.noarch", "7Server-RH7-RHOS-5.0:python-django-horizon-0:2014.1.1-2.el7ost.src", "7Server-RH7-RHOS-5.0:python-django-horizon-doc-0:2014.1.1-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-horizon: multiple XSS flaws" } ] }
gsd-2014-3473
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-3473", "description": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "id": "GSD-2014-3473", "references": [ "https://www.suse.com/security/cve/CVE-2014-3473.html", "https://access.redhat.com/errata/RHSA-2014:1188", "https://access.redhat.com/errata/RHSA-2014:0939", "https://ubuntu.com/security/CVE-2014-3473" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-3473" ], "details": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "id": "GSD-2014-3473", "modified": "2023-12-13T01:22:53.658684Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" }, { "name": "http://www.openwall.com/lists/oss-security/2014/07/08/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "name": "http://www.securityfocus.com/bid/68459", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/68459" }, { "name": "https://bugs.launchpad.net/horizon/+bug/1308727", "refsource": "MISC", "url": "https://bugs.launchpad.net/horizon/+bug/1308727" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2013.2.4", "versionStartIncluding": "2013.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2014.1.2", "versionStartIncluding": "2014.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3473" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "68459", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68459" }, { "name": "[oss-security] 20140708 [OSSA 2014-023] Multiple XSS vulnerabilities in Horizon (CVE-2014-3473, CVE-2014-3474, and CVE-2014-3475)", "refsource": "MLIST", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "name": "https://bugs.launchpad.net/horizon/+bug/1308727", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/horizon/+bug/1308727" }, { "name": "openSUSE-SU-2015:0078", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:39Z", "publishedDate": "2014-10-31T15:55Z" } } }
ghsa-8vwv-2v7v-jmgr
Vulnerability from github
Published
2022-05-13 01:11
Modified
2023-10-19 17:46
Summary
Horizon-Orchestration Cross-site scripting (XSS) vulnerability through resource name
Details
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "horizon" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "8.0.0a0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2014-3473" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2023-10-19T17:46:51Z", "nvd_published_at": "2014-10-31T15:55:00Z", "severity": "MODERATE" }, "details": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.", "id": "GHSA-8vwv-2v7v-jmgr", "modified": "2023-10-19T17:46:51Z", "published": "2022-05-13T01:11:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3473" }, { "type": "WEB", "url": "https://github.com/openstack/horizon/commit/c844bd692894353c60b320005b804970605e910f" }, { "type": "WEB", "url": "https://github.com/openstack/horizon/commit/de4466d88b816437fb29eff5ab23b9b964cd3985" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:0939" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:1188" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2014-3473" }, { "type": "WEB", "url": "https://bugs.launchpad.net/horizon/+bug/1308727" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116090" }, { "type": "PACKAGE", "url": "https://opendev.org/openstack/horizon" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/68459" } ], "schema_version": "1.4.0", "severity": [], "summary": "Horizon-Orchestration Cross-site scripting (XSS) vulnerability through resource name" }
CVE-2014-3473
Vulnerability from fkie_nvd
Published
2014-10-31 15:55
Modified
2024-11-21 02:08
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2014/07/08/6 | Mailing List, Patch | |
secalert@redhat.com | http://www.securityfocus.com/bid/68459 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugs.launchpad.net/horizon/+bug/1308727 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/07/08/6 | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/68459 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.launchpad.net/horizon/+bug/1308727 | Issue Tracking, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AF1648D-62B1-4F76-8A20-2018978EE155", "versionEndExcluding": "2013.2.4", "versionStartIncluding": "2013.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9660BD9-614A-416E-BF0C-F254DD95B6C0", "versionEndExcluding": "2014.1.2", "versionStartIncluding": "2014.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*", "matchCriteriaId": "6A3DF8E5-464D-46CC-B96C-B7CD91298C42", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la secci\u00f3n Orchestration/Stack en el cuadro de mandos Horizon Orchestration en OpenStack Dashboard (Horizon) anterior a 2013.2.4, 2014.1 anterior a 2014.1.2, y Juno anterior a Juno-2, cuando utilizado con Heat, permite a due\u00f1os o cat\u00e1logos de plantillas Orchestration inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una plantilla manipulada." } ], "id": "CVE-2014-3473", "lastModified": "2024-11-21T02:08:10.973", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-31T15:55:03.743", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68459" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/horizon/+bug/1308727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/68459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/horizon/+bug/1308727" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.