Vulnerabilities > CVE-2014-0152
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Session fixation vulnerability in the web admin interface in oVirt 3.4.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | Ovirt
| 37 |
Application | 9 |
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2014-0506.NASL |
description | Red Hat Enterprise Virtualization Manager 3.4 is now available. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual servers running Red Hat Enterprise Linux and Microsoft Windows. This package also includes the Red Hat Enterprise Virtualization Manager API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API). It was found that the oVirt web admin interface did not generate a new session ID after authenticating a user. A remote attacker could use this flaw to perform session fixation attacks. (CVE-2014-0152) It was found that the oVirt web admin interface stored session IDs in HTML5 local storage. A remote attacker could provide a specially crafted web page that, when visited by a user with a valid REST API session, would allow the attacker to read the session ID from local storage. This is possible because HTML5 local storage is not protected by the same-origin policy (SOP). (CVE-2014-0153) These updated Red Hat Enterprise Virtualization Manager packages also include numerous bug fixes and various enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Virtualization 3.4 Technical Notes, linked to in the References, for information on the most significant of these changes. All Red Hat Enterprise Virtualization Manager users are advised to upgrade to these updated packages, which resolve these issues and add these enhancements. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 79019 |
published | 2014-11-08 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/79019 |
title | RHEL 6 : rhevm (RHSA-2014:0506) |
Redhat
rpms |
|
Seebug
bulletinFamily | exploit |
description | CVE ID:CVE-2014-0152 oVirt是一个虚拟化平台,一个易于使用的Web界面。 由于程序允许用户通过未验证的HTTP请求执行某些操作,攻击者可以利用漏洞在一个登录的用户访问恶意网站时将请求发送到REST API或GWT RPC的servlet。 0 oVirt 3.x 目前没有详细解决方案: http://www.ovirt.org/Home |
id | SSV:62050 |
last seen | 2017-11-19 |
modified | 2014-04-03 |
published | 2014-04-03 |
reporter | Root |
title | oVirt跨站请求伪造漏洞 |