Vulnerabilities > CVE-2014-0152

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Session fixation vulnerability in the web admin interface in oVirt 3.4.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors.

Nessus

NASL familyRed Hat Local Security Checks
NASL idREDHAT-RHSA-2014-0506.NASL
descriptionRed Hat Enterprise Virtualization Manager 3.4 is now available. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual servers running Red Hat Enterprise Linux and Microsoft Windows. This package also includes the Red Hat Enterprise Virtualization Manager API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API). It was found that the oVirt web admin interface did not generate a new session ID after authenticating a user. A remote attacker could use this flaw to perform session fixation attacks. (CVE-2014-0152) It was found that the oVirt web admin interface stored session IDs in HTML5 local storage. A remote attacker could provide a specially crafted web page that, when visited by a user with a valid REST API session, would allow the attacker to read the session ID from local storage. This is possible because HTML5 local storage is not protected by the same-origin policy (SOP). (CVE-2014-0153) These updated Red Hat Enterprise Virtualization Manager packages also include numerous bug fixes and various enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Virtualization 3.4 Technical Notes, linked to in the References, for information on the most significant of these changes. All Red Hat Enterprise Virtualization Manager users are advised to upgrade to these updated packages, which resolve these issues and add these enhancements.
last seen2020-06-01
modified2020-06-02
plugin id79019
published2014-11-08
reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/79019
titleRHEL 6 : rhevm (RHSA-2014:0506)

Redhat

rpms
  • rhevm-0:3.4.0-0.21.el6ev
  • rhevm-backend-0:3.4.0-0.21.el6ev
  • rhevm-dbscripts-0:3.4.0-0.21.el6ev
  • rhevm-lib-0:3.4.0-0.21.el6ev
  • rhevm-restapi-0:3.4.0-0.21.el6ev
  • rhevm-setup-0:3.4.0-0.21.el6ev
  • rhevm-setup-base-0:3.4.0-0.21.el6ev
  • rhevm-setup-plugin-allinone-0:3.4.0-0.21.el6ev
  • rhevm-setup-plugin-ovirt-engine-0:3.4.0-0.21.el6ev
  • rhevm-setup-plugin-ovirt-engine-common-0:3.4.0-0.21.el6ev
  • rhevm-setup-plugin-websocket-proxy-0:3.4.0-0.21.el6ev
  • rhevm-tools-0:3.4.0-0.21.el6ev
  • rhevm-userportal-0:3.4.0-0.21.el6ev
  • rhevm-webadmin-portal-0:3.4.0-0.21.el6ev
  • rhevm-websocket-proxy-0:3.4.0-0.21.el6ev

Seebug

bulletinFamilyexploit
descriptionCVE ID:CVE-2014-0152 oVirt是一个虚拟化平台,一个易于使用的Web界面。 由于程序允许用户通过未验证的HTTP请求执行某些操作,攻击者可以利用漏洞在一个登录的用户访问恶意网站时将请求发送到REST API或GWT RPC的servlet。 0 oVirt 3.x 目前没有详细解决方案: http://www.ovirt.org/Home
idSSV:62050
last seen2017-11-19
modified2014-04-03
published2014-04-03
reporterRoot
titleoVirt跨站请求伪造漏洞