Add text for OSSN-0044
Related-Bug: #1420942 Change-Id: Iacb8f31bac0eae462d17d4af764702ada1e2d70e
This commit is contained in:
38
security-notes/OSSN-0044
Normal file
38
security-notes/OSSN-0044
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
Older versions of noVNC allow session theft
|
||||||
|
---
|
||||||
|
|
||||||
|
### Summary ###
|
||||||
|
Commonly packaged versions of noVNC allow an attacker to hijack user
|
||||||
|
sessions even when TLS is enabled. noVNC fails to set the secure flag
|
||||||
|
when setting cookies containing an authentication token.
|
||||||
|
|
||||||
|
### Affected Services / Software ###
|
||||||
|
Nova, when embedding noVNC prior to v0.5
|
||||||
|
|
||||||
|
### Discussion ###
|
||||||
|
Versions of noVNC prior to October 28, 2013 do not properly set the
|
||||||
|
secure flag on cookies for pages served over TLS. Since noVNC stores
|
||||||
|
authentication tokens in these cookies, an attacker who can modify
|
||||||
|
user traffic can steal these tokens and connect to the VNC session.
|
||||||
|
|
||||||
|
Affected deployments can be identified by looking for the "secure"
|
||||||
|
flag on the token cookie set by noVNC on TLS-enabled installations. If
|
||||||
|
the secure flag is missing, the installation is vulnerable.
|
||||||
|
|
||||||
|
At the time of writing, Debian, Ubuntu and Fedora do not provide
|
||||||
|
versions of this package with the appropriate patch.
|
||||||
|
|
||||||
|
### Recommended Actions ###
|
||||||
|
noVNC should be updated to version 0.5 or later. If this is not
|
||||||
|
possible, the upstream patch should be applied individually.
|
||||||
|
|
||||||
|
Upstream patch:
|
||||||
|
https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd
|
||||||
|
|
||||||
|
### Contacts / References ###
|
||||||
|
This OSSN : https://wiki.openstack.org/wiki/OSSN/OSSN-0044
|
||||||
|
Original LaunchPad Bug : https://bugs.launchpad.net/nova/+bug/1420942
|
||||||
|
OpenStack Security ML : openstack-security@lists.openstack.org
|
||||||
|
OpenStack Security Group : https://launchpad.net/~openstack-ossg
|
||||||
|
CVE: in progress-http://www.openwall.com/lists/oss-security/2015/02/17/1
|
||||||
|
|
||||||
Reference in New Issue
Block a user