CVE-2016-4428

Cross-site scripting (XSS) vulnerability in OpenStack Dashboard (Horizon) 8.0.1 and earlier and 9.0.0 through 9.0.1 allows remote authenticated users to inject arbitrary web script or HTML by injecting an AngularJS template in a dashboard form.
References
Link Resource
http://www.debian.org/security/2016/dsa-3617 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/06/17/4 Mailing List Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1268 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1269 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1270 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1271 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1272 Third Party Advisory
https://bugs.launchpad.net/horizon/+bug/1567673 Issue Tracking Third Party Advisory
https://review.openstack.org/329996 Patch Vendor Advisory
https://review.openstack.org/329997 Patch Vendor Advisory
https://review.openstack.org/329998 Patch Vendor Advisory
https://security.openstack.org/ossa/OSSA-2016-010.html Patch Vendor Advisory
http://www.debian.org/security/2016/dsa-3617 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/06/17/4 Mailing List Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1268 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1269 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1270 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1271 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1272 Third Party Advisory
https://bugs.launchpad.net/horizon/+bug/1567673 Issue Tracking Third Party Advisory
https://review.openstack.org/329996 Patch Vendor Advisory
https://review.openstack.org/329997 Patch Vendor Advisory
https://review.openstack.org/329998 Patch Vendor Advisory
https://security.openstack.org/ossa/OSSA-2016-010.html Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:horizon:9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openstack:horizon:9.0.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:52

Type Values Removed Values Added
References () http://www.debian.org/security/2016/dsa-3617 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3617 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/06/17/4 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/06/17/4 - Mailing List, Patch, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2016:1268 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1268 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2016:1269 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1269 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2016:1270 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1270 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2016:1271 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1271 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2016:1272 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1272 - Third Party Advisory
References () https://bugs.launchpad.net/horizon/+bug/1567673 - Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/horizon/+bug/1567673 - Issue Tracking, Third Party Advisory
References () https://review.openstack.org/329996 - Patch, Vendor Advisory () https://review.openstack.org/329996 - Patch, Vendor Advisory
References () https://review.openstack.org/329997 - Patch, Vendor Advisory () https://review.openstack.org/329997 - Patch, Vendor Advisory
References () https://review.openstack.org/329998 - Patch, Vendor Advisory () https://review.openstack.org/329998 - Patch, Vendor Advisory
References () https://security.openstack.org/ossa/OSSA-2016-010.html - Patch, Vendor Advisory () https://security.openstack.org/ossa/OSSA-2016-010.html - Patch, Vendor Advisory

Information

Published : 2016-07-12 19:59

Updated : 2024-11-21 02:52


NVD link : CVE-2016-4428

Mitre link : CVE-2016-4428

CVE.ORG link : CVE-2016-4428


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • openstack

debian

  • debian_linux

openstack

  • horizon
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')