First published: Mon Sep 08 2014(Updated: )
The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovirt | <=3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0153 is considered a medium severity vulnerability due to the potential exposure of sensitive session information.
To mitigate CVE-2014-0153, it is recommended to upgrade to a version of oVirt later than 3.4.0 that does not store session IDs in local storage.
CVE-2014-0153 affects oVirt version 3.4.0 and earlier.
Yes, CVE-2014-0153 can be exploited remotely by attackers through a crafted web page to obtain sensitive session information.
CVE-2014-0153 can lead to unauthorized access to user session data, compromising user privacy and security.