First published: Tue Nov 18 2014(Updated: )
It was reported that oVirt 3.2.2 and later did not correctly terminate sessions when a user logged out from the web interface (there are two sessions used between the browser and the backend: the engine and the restapi). Upon logout, only the engine session was invalidated but the restapi session persisted. If an attacker could obtain that session data and login with their own credentials, they could replace their session token with the stolen token and elevate their privileges to that of victim user. Note that in order for this to be exploited, the attacker must also have a valid login and authenticate successfully.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
oVirt oVirt | =3.3.2 | |
oVirt oVirt | =3.4.0 | |
Red Hat oVirt Engine | =3.2.2 | |
Red Hat oVirt Engine | =3.3-beta1 | |
Red Hat oVirt Engine | =3.3-rc1 | |
Red Hat oVirt Engine | =3.3-rc2 | |
Red Hat oVirt Engine | =3.3.0.1 | |
Red Hat oVirt Engine | =3.3.1 | |
Red Hat oVirt Engine | =3.3.1-beta1 | |
Red Hat oVirt Engine | =3.3.1-rc1 | |
Red Hat oVirt Engine | =3.3.2-beta1 | |
Red Hat oVirt Engine | =3.3.3-beta1 | |
Red Hat oVirt Engine | =3.3.3-rc1 | |
Red Hat oVirt Engine | =3.3.4-beta1 | |
Red Hat oVirt Engine | =3.3.4-rc1 | |
Red Hat oVirt Engine | =3.3.5-rc1 | |
Red Hat oVirt Engine | =3.4.0-beta1 | |
Red Hat oVirt Engine | =3.4.0-beta2 | |
Red Hat oVirt Engine | =3.4.0-beta3 | |
Red Hat oVirt Engine | =3.4.0-rc2 | |
Red Hat oVirt Engine | =3.4.0-rc3 | |
Red Hat oVirt Engine | =3.4.1 | |
Red Hat oVirt Engine | =3.4.1-rc1 | |
Red Hat oVirt Engine | =3.4.2 | |
Red Hat oVirt Engine | =3.4.2-rc1 | |
Red Hat oVirt Engine | =3.4.3 | |
Red Hat oVirt Engine | =3.4.3-rc1 | |
Red Hat oVirt Engine | =3.4.4 | |
Red Hat oVirt Engine | =3.4.4-rc1 | |
Red Hat oVirt Engine | =3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7851 has a moderate severity level due to session management issues that could lead to unauthorized access after logout.
To fix CVE-2014-7851, ensure that your oVirt version is updated to at least 3.4.5 where the session termination issues have been resolved.
CVE-2014-7851 affects oVirt versions 3.2.2 and later, including various 3.3.x and 3.4.x versions.
CVE-2014-7851 specifically affects the engine session and the restapi session between the browser and backend.
Yes, due to improper session termination, there is a risk that user data could be exposed to unauthorized access after logging out.