Bug 1190112 (CVE-2015-0259) - CVE-2015-0259 openstack-nova: console Cross-Site WebSocket hijacking
Summary: CVE-2015-0259 openstack-nova: console Cross-Site WebSocket hijacking
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-0259
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1200201 1200202 1200203 1200204 1200935 1201046 1202382
Blocks: 1190113 1194087
TreeView+ depends on / blocked
 
Reported: 2015-02-06 11:27 UTC by Vasyl Kaigorodov
Modified: 2021-08-18 09:42 UTC (History)
28 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that the OpenStack Compute (nova) console websocket did not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw.
Clone Of:
Environment:
Last Closed: 2015-06-14 22:45:31 UTC
Embargoed:


Attachments (Terms of Use)
upstream patch cve-2015-0259-stable-juno.patch (5.13 KB, text/plain)
2015-02-09 16:54 UTC, Martin Prpič
no flags Details
upstream patch cve-2015-0259-stable-icehouse.patch (4.98 KB, text/plain)
2015-02-09 16:56 UTC, Martin Prpič
no flags Details
upstream patch cve-2015-0259-master-kilo.patch (6.10 KB, text/plain)
2015-02-09 16:57 UTC, Martin Prpič
no flags Details
cve-2015-0259-master-kilo-v2.patch (12.87 KB, patch)
2015-03-04 00:33 UTC, Kurt Seifried
no flags Details | Diff
cve-2015-0259-stable-juno-v2.patch (10.24 KB, patch)
2015-03-04 00:34 UTC, Kurt Seifried
no flags Details | Diff
cve-2015-0259-stable-icehouse-v2.patch (9.71 KB, patch)
2015-03-04 00:34 UTC, Kurt Seifried
no flags Details | Diff
CVE-2015-0259 Juno Patch (10.25 KB, patch)
2015-03-10 00:45 UTC, Garth Mollett
no flags Details | Diff
CVE-2015-0259 Icehouse Patch (9.72 KB, patch)
2015-03-10 00:50 UTC, Garth Mollett
no flags Details | Diff
CVE-2015-0259 Kilo Patch (12.89 KB, patch)
2015-03-10 00:51 UTC, Garth Mollett
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Launchpad 1409142 0 None None None Never
OpenStack gerrit 163033 0 None None None Never
Red Hat Product Errata RHSA-2015:0790 0 normal SHIPPED_LIVE Important: openstack-nova security, bug fix, and enhancement update 2015-04-07 19:07:41 UTC
Red Hat Product Errata RHSA-2015:0843 0 normal SHIPPED_LIVE Important: openstack-nova security, bug fix, and enhancement update 2015-04-16 18:27:45 UTC
Red Hat Product Errata RHSA-2015:0844 0 normal SHIPPED_LIVE Important: openstack-nova security, bug fix, and enhancement update 2015-04-16 18:27:38 UTC

Description Vasyl Kaigorodov 2015-02-06 11:27:03 UTC
Upstream has reported below issue in OpenStack Nova:

Title: Nova console Cross-Site WebSocket hijacking
Reporter: Brian Manifold (Cisco), Paul McMillan (Nebula)
Products: Nova
Versions: up to 2014.1.3 and 2014.2 versions up to 2014.2.2

Description:
Brian Manifold from Cisco and Paul McMillan from Nebula reported a vulnerability in Nova console websocket. By tricking an authenticated user into visiting a malicious URL, a remote attacker or a man in the middle may exploit a cross-site-websocket-hijacking vulnerability resulting in potential hijack of consoles where the user is still logged in. Only Nova setups with vnc or spice enabled are affected.

Comment 1 Martin Prpič 2015-02-09 16:54:25 UTC
Created attachment 989782 [details]
upstream patch cve-2015-0259-stable-juno.patch

Comment 2 Martin Prpič 2015-02-09 16:56:41 UTC
Created attachment 989793 [details]
upstream patch cve-2015-0259-stable-icehouse.patch

Comment 3 Martin Prpič 2015-02-09 16:57:12 UTC
Created attachment 989797 [details]
upstream patch cve-2015-0259-master-kilo.patch

Comment 4 Garth Mollett 2015-02-19 00:15:46 UTC
Please note, the above patches are incomplete and new ones are expected.

Comment 8 Kurt Seifried 2015-03-04 00:31:21 UTC
A new proposed embargoed date has been set as 2015-03-10, 1500UTC, please note that this may change. I have also added the updated patches.

Comment 9 Kurt Seifried 2015-03-04 00:33:40 UTC
Created attachment 997714 [details]
cve-2015-0259-master-kilo-v2.patch

Comment 10 Kurt Seifried 2015-03-04 00:34:12 UTC
Created attachment 997715 [details]
cve-2015-0259-stable-juno-v2.patch

Comment 11 Kurt Seifried 2015-03-04 00:34:34 UTC
Created attachment 997716 [details]
cve-2015-0259-stable-icehouse-v2.patch

Comment 12 Garth Mollett 2015-03-10 00:45:56 UTC
Created attachment 999698 [details]
CVE-2015-0259 Juno Patch

Comment 13 Garth Mollett 2015-03-10 00:50:29 UTC
Created attachment 999700 [details]
CVE-2015-0259 Icehouse Patch

Comment 14 Garth Mollett 2015-03-10 00:51:33 UTC
Created attachment 999702 [details]
CVE-2015-0259 Kilo Patch

Comment 18 Matthew Booth 2015-03-11 14:54:35 UTC
The embargo is well and truly broken on this, with both a public bug and a public patch posted. If there is any additional inconvenience associated with the embargo process I suggest we drop it.

Comment 19 Martin Prpič 2015-03-11 16:47:29 UTC
Created openstack-nova tracking bugs for this issue:

Affects: fedora-all [bug 1200935]

Comment 20 Garth Mollett 2015-03-11 22:44:35 UTC
Current patches, as attached to this bug, break non-browser based clients.
See: https://bugs.launchpad.net/nova/+bug/1409142/comments/133 (which should be public now).

Comment 21 Garth Mollett 2015-03-11 22:45:36 UTC
Created openstack-nova tracking bugs for this issue:

Affects: openstack-rdo [bug 1201046]

Comment 23 errata-xmlrpc 2015-04-07 15:09:25 UTC
This issue has been addressed in the following products:

  OpenStack 6 for RHEL 7

Via RHSA-2015:0790 https://rhn.redhat.com/errata/RHSA-2015-0790.html

Comment 24 errata-xmlrpc 2015-04-16 14:33:54 UTC
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 6

Via RHSA-2015:0844 https://rhn.redhat.com/errata/RHSA-2015-0844.html

Comment 25 errata-xmlrpc 2015-04-16 14:35:41 UTC
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 7

Via RHSA-2015:0843 https://rhn.redhat.com/errata/RHSA-2015-0843.html


Note You need to log in before you can comment on or make changes to this bug.