First published: Thu Aug 20 2015(Updated: )
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in OpenStack Dashboard (Horizon) 2014.2 before 2014.2.4 and 2015.1.x before 2015.1.1 allows remote attackers to inject arbitrary web script or HTML via the description parameter in a heat template, which is not properly handled in the help_text attribute in the Field class.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/horizon | <8.0.0a0 | 8.0.0a0 |
Debian | =8.0 | |
OpenStack Horizon | =2014.2.0 | |
OpenStack Horizon | =2014.2.1 | |
OpenStack Horizon | =2014.2.2 | |
OpenStack Horizon | =2014.2.3 | |
OpenStack Horizon | =2015.1.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3219 has a medium severity rating due to the potential for cross-site scripting attacks.
To fix CVE-2015-3219, upgrade the OpenStack Dashboard (Horizon) to version 2014.2.4 or later, or 2015.1.1 or later.
CVE-2015-3219 affects OpenStack Horizon versions 2014.2.0 through 2014.2.3 and 2015.1.0.
Yes, CVE-2015-3219 can be exploited by remote attackers through the description parameter in heat templates.
Yes, the package requiring an upgrade is 'horizon' to version 8.0.0a0 or higher for mitigation of CVE-2015-3219.