First published: Fri Jul 17 2020(Updated: )
A flaw was found in Ovirt Engine's web interface in ovirt 4.4 and earlier, where it did not filter user-controllable parameters completely, resulting in a reflected cross-site scripting attack. This flaw allows an attacker to leverage a phishing attack, steal an unsuspecting user's cookies or other confidential information, or impersonate them within the application's context.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovirt Engine | <=4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14333 is a vulnerability found in the web interface of ovirt-engine 4.4.2 and earlier, which allows for a reflected cross-site scripting attack.
The severity of CVE-2020-14333 is medium with a CVSS score of 6.1.
CVE-2020-14333 allows an attacker to perform a phishing attack, steal user's cookies, or execute other malicious actions through the web interface of ovirt-engine.
ovirt-engine versions up to and including 4.4.0 are affected by CVE-2020-14333.
To fix the CVE-2020-14333 vulnerability, users should upgrade ovirt-engine to version 4.4.2 or later.