Bug 1081849 (CVE-2014-0151)

Summary: CVE-2014-0151 ovirt-engine: cross-site request forgery (CSRF)
Product: [Other] Security Response Reporter: David Jorm <djorm>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: awels, cpelland, dougsland, extras-orphan, grocha, idith, juan.hernandez, mjc, oramraz, srevivo, vszocs, ykaul
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A Cross-Site Request Forgery (CSRF) flaw was found in the oVirt REST API. A remote attacker could provide a specially crafted web page that, when visited by a user with a valid REST API session, would allow the attacker to trigger calls to the oVirt REST API.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-20 10:43:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1081903, 1081905, 1081906    
Bug Blocks: 1103966    

Description David Jorm 2014-03-28 05:19:00 UTC
The oVirt REST API is vulnerable to Cross-Site Request Forgery (CSRF) attacks. A remote attacker could provide a specially-crafted web page that, when visited by a user with a valid REST API session, would allow the attacker to trigger calls to the oVirt REST API.

Comment 1 David Jorm 2014-03-28 07:27:03 UTC
Upstream bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1077441

Comment 3 David Jorm 2014-03-28 07:39:37 UTC
Created ovirt-engine tracking bugs for this issue:

Affects: fedora-all [bug 1081906]

Comment 4 Juan Hernández 2014-04-02 14:21:35 UTC
Note that the same vulnerability affects the oVirt backend/GUI, as an attacker can also craft a request for the GWT RPC servlet using the same method.

Comment 14 errata-xmlrpc 2015-02-11 17:59:48 UTC
This issue has been addressed in the following products:

  RHEV Manager version 3.5

Via RHSA-2015:0158 https://rhn.redhat.com/errata/RHSA-2015-0158.html