First published: Fri Dec 04 2020(Updated: )
An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Horizon | >=15.3.0<15.3.2 | |
OpenStack Horizon | >=16.0.0<16.2.1 | |
OpenStack Horizon | >=17.0.0<18.3.3 | |
OpenStack Horizon | >=18.4.0<=18.5.0 | |
Debian Debian Linux | =10.0 | |
debian/horizon | 3:14.0.2-3+deb10u2 3:18.6.2-5+deb11u2 3:23.0.0-5+deb12u1 3:23.3.0-1 | |
pip/horizon | >=18.4.0<18.6.0 | 18.6.0 |
pip/horizon | >=17.0.0<18.3.3 | 18.3.3 |
pip/horizon | >=16.0.0<16.2.1 | 16.2.1 |
pip/horizon | <15.3.2 | 15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29565 is a vulnerability in OpenStack Horizon that allows an attacker to supply a malicious URL and cause an automatic redirect.
CVE-2020-29565 has a severity rating of 6.1, which is considered high.
CVE-2020-29565 affects OpenStack Horizon versions before 15.3.2, 16.x before 16.2.1, 17.x, and 18.x before 18.3.3, 18.4.x, and 18.5.x.
To fix CVE-2020-29565, it is recommended to upgrade to OpenStack Horizon versions 15.3.2, 16.2.1, 18.3.3, 18.4.x, or 18.5.x, depending on the specific affected version.
You can find more information about CVE-2020-29565 at the following references: [Reference 1](https://security-tracker.debian.org/tracker/CVE-2020-29565), [Reference 2](https://review.opendev.org/758843), [Reference 3](https://review.opendev.org/758841).