The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://gerrit.ovirt.org/#/c/25987/ | patch |
http://www.ovirt.org/Security_advisories | patch vendor advisory |