Description of problem:
Attackers can force switch all the REST APIs(https://<host_ip>/api) from HTTPS into HTTP, so attackers can induce the victim user using crafted html page for eavesdropping user credentials like authorization token.
Version-Release number of selected component (if applicable):
oVirt 3.4.0-5 beta3
How reproducible:
100%
Steps to Reproduce:
1. Open http://<host_ip>/api in browser
Actual results:
Browser successfully opens the page
Expected results:
Should force switch to https://<host_ip>/api
Additional info:
(In reply to Juan Hernández from comment #2)
> What backwards compatibility? The previous version didn't accept non
> encrypted connections.
Correct.
My bad[1]
Was confused with other application.
[1] http://gerrit.ovirt.org/#/c/6827/