Bug 1866688 - CVE-2020-10775 ovirt-engine: Redirect to arbitrary URL allows for phishing
Summary: CVE-2020-10775 ovirt-engine: Redirect to arbitrary URL allows for phishing
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: ovirt-engine
Classification: oVirt
Component: AAA
Version: 4.4.1
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ovirt-4.4.2
: 4.4.2.3
Assignee: Artur Socha
QA Contact: Lucie Leistnerova
URL:
Whiteboard:
Depends On:
Blocks: CVE-2020-10775
TreeView+ depends on / blocked
 
Reported: 2020-08-06 06:46 UTC by Stoyan Nikolov
Modified: 2020-09-18 09:02 UTC (History)
3 users (show)

Fixed In Version: rhv-4.4.2-3, ovirt-engine-4.4.2.3
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-09-18 07:12:56 UTC
oVirt Team: Infra
Embargoed:
pm-rhel: ovirt-4.4+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
oVirt gerrit 110685 0 master MERGED aaa: redirect to arbitrary URL allows for phishing 2020-09-18 09:00:04 UTC

Description Stoyan Nikolov 2020-08-06 06:46:35 UTC
Thus was created to ensure that one or more security vulnerabilities are fixed in affected versions of ovirt-engine.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

Please also mention the CVE IDs being fixed in the changelog and the commit message.

Comment 1 Lucie Leistnerova 2020-08-27 18:29:12 UTC
user logs in and error is printed -
app_url domain differs from SSO_ENGINE_URL or SSO_ALTERNATE_ENGINE_FQDN domains 

verified in ovirt-engine-4.4.2.3-0.6.el8ev.noarch

Comment 2 Sandro Bonazzola 2020-09-18 07:12:56 UTC
This bugzilla is included in oVirt 4.4.2 release, published on September 17th 2020.

Since the problem described in this bug report should be resolved in oVirt 4.4.2 release, it has been closed with a resolution of CURRENT RELEASE.

If the solution does not work for you, please open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.