The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page.
References
Link | Resource |
---|---|
http://gerrit.ovirt.org/#/c/25987/ | Patch |
http://www.ovirt.org/Security_advisories | Patch Vendor Advisory |
Configurations
History
13 Feb 2023, 00:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page. |
02 Feb 2023, 15:16
Type | Values Removed | Values Added |
---|---|---|
Summary | CVE-2014-0153 ovirt-engine-api: session ID stored in HTML5 local storage | |
References |
|
Information
Published : 2014-09-08 14:55
Updated : 2023-12-10 11:31
NVD link : CVE-2014-0153
Mitre link : CVE-2014-0153
CVE.ORG link : CVE-2014-0153
JSON object : View
Products Affected
ovirt
- ovirt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor