Bug 1190112 (CVE-2015-0259)

Summary: CVE-2015-0259 openstack-nova: console Cross-Site WebSocket hijacking
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abaron, aortega, apevec, ayoung, berrange, chrisw, dallan, dasmith, eglynn, gkotton, gmollett, jrusnack, kchamart, lhh, lpeer, markmc, mbooth, ndipanov, osoukup, pbrady, rbryant, sbauza, sclewis, security-response-team, sferdjao, sgordon, vromanso, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was discovered that the OpenStack Compute (nova) console websocket did not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-06-14 22:45:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1200201, 1200202, 1200203, 1200204, 1200935, 1201046, 1202382    
Bug Blocks: 1190113, 1194087    
Attachments:
Description Flags
upstream patch cve-2015-0259-stable-juno.patch
none
upstream patch cve-2015-0259-stable-icehouse.patch
none
upstream patch cve-2015-0259-master-kilo.patch
none
cve-2015-0259-master-kilo-v2.patch
none
cve-2015-0259-stable-juno-v2.patch
none
cve-2015-0259-stable-icehouse-v2.patch
none
CVE-2015-0259 Juno Patch
none
CVE-2015-0259 Icehouse Patch
none
CVE-2015-0259 Kilo Patch none

Description Vasyl Kaigorodov 2015-02-06 11:27:03 UTC
Upstream has reported below issue in OpenStack Nova:

Title: Nova console Cross-Site WebSocket hijacking
Reporter: Brian Manifold (Cisco), Paul McMillan (Nebula)
Products: Nova
Versions: up to 2014.1.3 and 2014.2 versions up to 2014.2.2

Description:
Brian Manifold from Cisco and Paul McMillan from Nebula reported a vulnerability in Nova console websocket. By tricking an authenticated user into visiting a malicious URL, a remote attacker or a man in the middle may exploit a cross-site-websocket-hijacking vulnerability resulting in potential hijack of consoles where the user is still logged in. Only Nova setups with vnc or spice enabled are affected.

Comment 1 Martin Prpič 2015-02-09 16:54:25 UTC
Created attachment 989782 [details]
upstream patch cve-2015-0259-stable-juno.patch

Comment 2 Martin Prpič 2015-02-09 16:56:41 UTC
Created attachment 989793 [details]
upstream patch cve-2015-0259-stable-icehouse.patch

Comment 3 Martin Prpič 2015-02-09 16:57:12 UTC
Created attachment 989797 [details]
upstream patch cve-2015-0259-master-kilo.patch

Comment 4 Garth Mollett 2015-02-19 00:15:46 UTC
Please note, the above patches are incomplete and new ones are expected.

Comment 8 Kurt Seifried 2015-03-04 00:31:21 UTC
A new proposed embargoed date has been set as 2015-03-10, 1500UTC, please note that this may change. I have also added the updated patches.

Comment 9 Kurt Seifried 2015-03-04 00:33:40 UTC
Created attachment 997714 [details]
cve-2015-0259-master-kilo-v2.patch

Comment 10 Kurt Seifried 2015-03-04 00:34:12 UTC
Created attachment 997715 [details]
cve-2015-0259-stable-juno-v2.patch

Comment 11 Kurt Seifried 2015-03-04 00:34:34 UTC
Created attachment 997716 [details]
cve-2015-0259-stable-icehouse-v2.patch

Comment 12 Garth Mollett 2015-03-10 00:45:56 UTC
Created attachment 999698 [details]
CVE-2015-0259 Juno Patch

Comment 13 Garth Mollett 2015-03-10 00:50:29 UTC
Created attachment 999700 [details]
CVE-2015-0259 Icehouse Patch

Comment 14 Garth Mollett 2015-03-10 00:51:33 UTC
Created attachment 999702 [details]
CVE-2015-0259 Kilo Patch

Comment 18 Matthew Booth 2015-03-11 14:54:35 UTC
The embargo is well and truly broken on this, with both a public bug and a public patch posted. If there is any additional inconvenience associated with the embargo process I suggest we drop it.

Comment 19 Martin Prpič 2015-03-11 16:47:29 UTC
Created openstack-nova tracking bugs for this issue:

Affects: fedora-all [bug 1200935]

Comment 20 Garth Mollett 2015-03-11 22:44:35 UTC
Current patches, as attached to this bug, break non-browser based clients.
See: https://bugs.launchpad.net/nova/+bug/1409142/comments/133 (which should be public now).

Comment 21 Garth Mollett 2015-03-11 22:45:36 UTC
Created openstack-nova tracking bugs for this issue:

Affects: openstack-rdo [bug 1201046]

Comment 23 errata-xmlrpc 2015-04-07 15:09:25 UTC
This issue has been addressed in the following products:

  OpenStack 6 for RHEL 7

Via RHSA-2015:0790 https://rhn.redhat.com/errata/RHSA-2015-0790.html

Comment 24 errata-xmlrpc 2015-04-16 14:33:54 UTC
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 6

Via RHSA-2015:0844 https://rhn.redhat.com/errata/RHSA-2015-0844.html

Comment 25 errata-xmlrpc 2015-04-16 14:35:41 UTC
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 7

Via RHSA-2015:0843 https://rhn.redhat.com/errata/RHSA-2015-0843.html