First published: Fri Oct 31 2014(Updated: )
Cross-site scripting (XSS) vulnerability in `horizon/static/horizon/js/horizon.instances.js` in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/horizon | <8.0.0a0 | 8.0.0a0 |
OpenStack Horizon | >=2013.2<2013.2.4 | |
OpenStack Horizon | >=2014.1<2014.1.2 | |
OpenStack Horizon | =juno-1 | |
SUSE Linux | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3474 is classified as a medium severity vulnerability due to its potential impact on application security via XSS attacks.
To fix CVE-2014-3474, upgrade OpenStack Horizon to version 2013.2.4 or later, 2014.1.2 or later, or Juno-2 or later.
CVE-2014-3474 affects OpenStack Horizon versions prior to 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2.
CVE-2014-3474 can be exploited for cross-site scripting (XSS) attacks, allowing attackers to inject arbitrary web scripts or HTML.
Yes, patches for CVE-2014-3474 are included in the recommended version upgrades for the affected OpenStack Horizon releases.