First published: Fri Oct 16 2020(Updated: )
An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack blazar-dashboard | <1.3.1 | |
OpenStack blazar-dashboard | =2.0.0 | |
OpenStack blazar-dashboard | =3.0.0 | |
pip/blazar-dashboard | =3.0.0 | 3.0.1 |
pip/blazar-dashboard | =2.0.0 | 2.0.1 |
pip/blazar-dashboard | <1.3.1 | 1.3.1 |
<1.3.1 | ||
=2.0.0 | ||
=3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-26943.
The severity level of CVE-2020-26943 is critical with a score of 9.9.
OpenStack blazar-dashboard versions before 1.3.1, 2.0.0, and 3.0.0 are affected by CVE-2020-26943.
An attacker with access to the Blazar dashboard in Horizon can trigger code execution on the Horizon host.
Yes, the fix for CVE-2020-26943 is available in OpenStack blazar-dashboard 1.3.1, 2.0.0, and 3.0.0.