The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page.
References
Link | Resource |
---|---|
http://gerrit.ovirt.org/#/c/25987/ | Patch |
http://www.ovirt.org/Security_advisories | Patch Vendor Advisory |
http://gerrit.ovirt.org/#/c/25987/ | Patch |
http://www.ovirt.org/Security_advisories | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://gerrit.ovirt.org/#/c/25987/ - Patch | |
References | () http://www.ovirt.org/Security_advisories - Patch, Vendor Advisory |
Information
Published : 2014-09-08 14:55
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0153
Mitre link : CVE-2014-0153
CVE.ORG link : CVE-2014-0153
JSON object : View
Products Affected
ovirt
- ovirt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor