Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1193451 - (CVE-2013-7436) CVE-2013-7436 novnc: session hijack through insecurely set session token cookies
CVE-2013-7436 novnc: session hijack through insecurely set session token cookies
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20131028,repor...
: Security
Depends On: 1193245 1193454 1203013 1203014 1203015 1203016
Blocks: 1193452
  Show dependency treegraph
 
Reported: 2015-02-17 06:26 EST by Vasyl Kaigorodov
Modified: 2018-03-05 09:58 EST (History)
28 users (show)

See Also:
Fixed In Version: noVNC 0.5.1
Doc Type: Bug Fix
Doc Text:
It was discovered that noVNC did not properly set the 'secure' flag when issuing cookies. An attacker could use this flaw to intercept cookies via a man-in-the-middle attack.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0788 normal SHIPPED_LIVE Moderate: novnc security update 2015-04-07 15:08:12 EDT
Red Hat Product Errata RHSA-2015:0833 normal SHIPPED_LIVE Moderate: novnc security update 2015-04-16 13:53:08 EDT
Red Hat Product Errata RHSA-2015:0834 normal SHIPPED_LIVE Moderate: novnc security update 2015-04-16 13:53:00 EDT
Red Hat Product Errata RHSA-2015:0884 normal SHIPPED_LIVE Moderate: novnc security update 2015-04-23 13:04:07 EDT

  None (edit)
Description Vasyl Kaigorodov 2015-02-17 06:26:21 EST
Paul McMillan reported that noVNC prior to this patch:
https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd
allows an attacker to steal insecurely set session token cookies, hijacking active or inactive VNC sessions.
Comment 1 Vasyl Kaigorodov 2015-02-17 06:32:41 EST
Created novnc tracking bugs for this issue:

Affects: epel-all [bug 1193454]
Comment 2 Paul McMillan 2015-03-02 15:11:43 EST
Does the post to oss-security need a bump? Nobody seems to have assigned a CVE for this issue...
Comment 3 Fedora Update System 2015-03-14 20:58:17 EDT
novnc-0.5.1-2.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 4 Fedora Update System 2015-03-14 20:59:49 EDT
novnc-0.5.1-2.el7 has been pushed to the Fedora EPEL 7 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 5 Frantisek Kobzik 2015-03-16 10:27:25 EDT
It looks noVNC and SPICE-HTML5 in oVirt/RHEV-M is unaffected by this CVE (we don't use cookies).
Comment 6 Paul McMillan 2015-03-16 17:26:17 EDT
Unless you've explicitly disabled setting the cookie by modifying the source code, noVNC sets one. You're probably still vulnerable.

Log into a terminal and check the cookies, if you see an insecure cookie with a token in it, you've got the problem.
Comment 13 errata-xmlrpc 2015-04-07 11:11:58 EDT
This issue has been addressed in the following products:

  OpenStack 6 for RHEL 7

Via RHSA-2015:0788 https://rhn.redhat.com/errata/RHSA-2015-0788.html
Comment 14 errata-xmlrpc 2015-04-16 10:00:25 EDT
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 7

Via RHSA-2015:0834 https://rhn.redhat.com/errata/RHSA-2015-0834.html
Comment 15 errata-xmlrpc 2015-04-16 10:01:07 EDT
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 6

Via RHSA-2015:0833 https://rhn.redhat.com/errata/RHSA-2015-0833.html
Comment 16 errata-xmlrpc 2015-04-23 09:04:14 EDT
This issue has been addressed in the following products:

  OpenStack 4 for RHEL 6

Via RHSA-2015:0884 https://rhn.redhat.com/errata/RHSA-2015-0884.html

Note You need to log in before you can comment on or make changes to this bug.