Add text for OSSN-0044
Related-Bug: #1420942 Change-Id: Iacb8f31bac0eae462d17d4af764702ada1e2d70e
This commit is contained in:
38
security-notes/OSSN-0044
Normal file
38
security-notes/OSSN-0044
Normal file
@@ -0,0 +1,38 @@
|
||||
Older versions of noVNC allow session theft
|
||||
---
|
||||
|
||||
### Summary ###
|
||||
Commonly packaged versions of noVNC allow an attacker to hijack user
|
||||
sessions even when TLS is enabled. noVNC fails to set the secure flag
|
||||
when setting cookies containing an authentication token.
|
||||
|
||||
### Affected Services / Software ###
|
||||
Nova, when embedding noVNC prior to v0.5
|
||||
|
||||
### Discussion ###
|
||||
Versions of noVNC prior to October 28, 2013 do not properly set the
|
||||
secure flag on cookies for pages served over TLS. Since noVNC stores
|
||||
authentication tokens in these cookies, an attacker who can modify
|
||||
user traffic can steal these tokens and connect to the VNC session.
|
||||
|
||||
Affected deployments can be identified by looking for the "secure"
|
||||
flag on the token cookie set by noVNC on TLS-enabled installations. If
|
||||
the secure flag is missing, the installation is vulnerable.
|
||||
|
||||
At the time of writing, Debian, Ubuntu and Fedora do not provide
|
||||
versions of this package with the appropriate patch.
|
||||
|
||||
### Recommended Actions ###
|
||||
noVNC should be updated to version 0.5 or later. If this is not
|
||||
possible, the upstream patch should be applied individually.
|
||||
|
||||
Upstream patch:
|
||||
https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd
|
||||
|
||||
### Contacts / References ###
|
||||
This OSSN : https://wiki.openstack.org/wiki/OSSN/OSSN-0044
|
||||
Original LaunchPad Bug : https://bugs.launchpad.net/nova/+bug/1420942
|
||||
OpenStack Security ML : openstack-security@lists.openstack.org
|
||||
OpenStack Security Group : https://launchpad.net/~openstack-ossg
|
||||
CVE: in progress-http://www.openwall.com/lists/oss-security/2015/02/17/1
|
||||
|
||||
Reference in New Issue
Block a user