Jump to content
Compatible Support Forums
Sign in to follow this  
news

AllPuter.com product launch: Bed / Kitchen Stand for iPhone / iPad Air / iPad Mini / Galaxy Notes / Galaxy Tabs / Smartphones

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Moderate: python-django-horizon security update

Advisory ID: RHSA-2014:1188-01

Product: Red Hat Enterprise Linux OpenStack Platform

Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1188.html

Issue date: 2014-09-15

CVE Names: CVE-2014-3473 CVE-2014-3474 CVE-2014-3475

CVE-2014-3594

=====================================================================

 

1. Summary:

 

Updated python-django-horizon packages that fix multiple security issues

are now available for Red Hat Enterprise Linux OpenStack Platform 4.0.

 

Red Hat Product Security has rated this update as having Moderate security

impact. Common Vulnerability Scoring System (CVSS) base scores, which give

detailed severity ratings, are available for each vulnerability from the

CVE links in the References section.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux OpenStack Platform 4.0 - noarch

 

3. Description:

 

OpenStack Dashboard (horizon) provides administrators and users with a

graphical interface to access, provision, and automate cloud-based

resources.

 

A cross-site scripting (XSS) flaw was found in the way orchestration

templates were handled. An owner of such a template could use this flaw to

perform XSS attacks against other Horizon users. (CVE-2014-3473)

 

It was found that network names were not sanitized. A malicious user could

use this flaw to perform XSS attacks against other Horizon users by

creating a network with a specially crafted name. (CVE-2014-3474)

 

It was found that certain email addresses were not sanitized. An

administrator could use this flaw to perform XSS attacks against other

Horizon users by storing an email address that has a specially crafted

name. (CVE-2014-3475)

 

A persistent cross-site scripting (XSS) flaw was found in the horizon host

aggregate interface. A user with sufficient privileges to add a host

aggregate could potentially use this flaw to capture the credentials of

another user. (CVE-2014-3594)

 

Red Hat would like to thank the OpenStack project for reporting these

issues. Upstream acknowledges Jason Hullinger from Hewlett Packard as the

original reporter of CVE-2014-3473, Craig Lorentzen from Cisco as the

original reporter of CVE-2014-3474, Michael Xin from Rackspace as the

original reporter of CVE-2014-3475, and Dennis Felsch and Mario Heiderich

from the Horst Görtz Institute for IT-Security, Ruhr-University Bochum as

the original reporter of CVE-2014-3594.

 

All python-django-horizon users are advised to upgrade to these updated

packages, which correct these issues.

 

4. Solution:

 

Before applying this update, make sure all previously released errata

relevant to your system have been applied.

 

This update is available via the Red Hat Network. Details on how to

use the Red Hat Network to apply this update are available at

https://access.redhat.com/articles/11258

 

5. Bugs fixed (https://bugzilla.redhat.com/):

 

1116090 - CVE-2014-3473 CVE-2014-3474 CVE-2014-3475 openstack-horizon: multiple XSS flaws

1129774 - CVE-2014-3594 openstack-horizon: persistent XSS in Horizon Host Aggregates interface

 

6. Package List:

 

Red Hat Enterprise Linux OpenStack Platform 4.0:

 

Source:

python-django-horizon-2013.2.3-3.el6ost.src.rpm

 

noarch:

openstack-dashboard-2013.2.3-3.el6ost.noarch.rpm

openstack-dashboard-theme-2013.2.3-3.el6ost.noarch.rpm

python-django-horizon-2013.2.3-3.el6ost.noarch.rpm

python-django-horizon-doc-2013.2.3-3.el6ost.noarch.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://access.redhat.com/security/team/key/#package

 

7. References:

 

https://www.redhat.com/security/data/cve/CVE-2014-3473.html

https://www.redhat.com/security/data/cve/CVE-2014-3474.html

https://www.redhat.com/security/data/cve/CVE-2014-3475.html

https://www.redhat.com/security/data/cve/CVE-2014-3594.html

https://access.redhat.com/security/updates/classification/#moderate

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://access.redhat.com/security/team/contact/

 

Copyright 2014 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1

 

iD8DBQFUFn/CXlSAg2UNWIIRAgwtAJ9LrtKZOjNqnG3grUMGTI451ygeZQCfT9Pw

TYIRSQpJljn+eMyyG8++h2E=

=62sa

-----END PGP SIGNATURE-----

 

 

--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×