yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #03214
[Bug 1039077] Re: [OSSA 2012-012] open redirect / phishing attack via "next" parameter
** Summary changed:
- open redirect / phishing attack via "next" parameter
+ [OSSA 2012-012] open redirect / phishing attack via "next" parameter
** Also affects: ossa
Importance: Undecided
Status: New
** Changed in: ossa
Status: New => Fix Released
** Changed in: ossa
Assignee: (unassigned) => Russell Bryant (russellb)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1039077
Title:
[OSSA 2012-012] open redirect / phishing attack via "next" parameter
Status in OpenStack Dashboard (Horizon):
Invalid
Status in OpenStack Dashboard (Horizon) essex series:
Fix Released
Status in OpenStack Security Advisories:
Fix Released
Status in “horizon” package in Ubuntu:
Fix Released
Bug description:
The "next" parameter is used here and there in the Dasboard.
http://10.122.185.2/auth/login/?next=http://www.heise.de
Redirects to www.heise.de.
Instead of redirecting to heise an attacker can redirect to a cloned Dasboard
to steal information, so called Phishing Attack.
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
http://cwe.mitre.org/data/definitions/601.html
Folsom seems to be safe, but it affects Essex.
https://github.com/gabrielhurley/django_openstack_auth/pull/7
To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1039077/+subscriptions