First published: Wed Apr 01 2015(Updated: )
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Nova | >=2014.1<2014.1.4 | |
OpenStack Nova | >=2014.2<2014.2.3 | |
OpenStack Nova | =2015.1.0-milestone1 | |
OpenStack Nova | =2015.1.0-milestone2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0259 is classified as a high severity vulnerability due to the potential for authentication hijacking.
To fix CVE-2015-0259, you should upgrade OpenStack Compute (Nova) to version 2014.1.4 or later, or 2014.2.3 or later.
CVE-2015-0259 affects OpenStack Compute (Nova) before version 2014.1.4, 2014.2.x before 2014.2.3, and certain milestones of 2015.1.0.
CVE-2015-0259 allows remote attackers to hijack user authentication, potentially gaining unauthorized access to console sessions.
While CVE-2015-0259 is from 2015, it remains relevant for users of outdated OpenStack versions that have not been patched.