An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://bugs.launchpad.net/horizon/+bug/1865026 | issue tracking exploit third party advisory |
https://review.opendev.org/c/openstack/horizon/+/758841/ | third party advisory patch |
https://review.opendev.org/c/openstack/horizon/+/758843/ | third party advisory patch |
https://security.openstack.org/ossa/OSSA-2020-008.html | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2020/12/08/2 | mailing list third party advisory patch |
https://www.debian.org/security/2020/dsa-4820 | third party advisory vendor advisory |