- Issued:
- 2016-10-26
- Updated:
- 2016-10-26
RHSA-2016:2115 - Security Advisory
Synopsis
Moderate: openstack-manila-ui security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for openstack-manila-ui is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenStack's File Share Service (manila) provides the means to easily provision shared file systems that can be consumed by multiple instances. These shared file systems are provisioned from pre-existing, back-end volumes. The UI component provides the dashboard plugin for the service.
Security Fix(es):
- A cross-site scripting flaw was discovered in openstack-manila-ui's Metadata field contained in its "Create Share" form. A user could inject malicious HTML/JavaScript code that would then be reflected in the "Shares" overview. Remote, authenticated, but unprivileged users could exploit this vulnerability to steal session cookies and escalate their privileges. (CVE-2016-6519)
Red Hat would like to thank SUSE for reporting this issue.
SUSE acknowledges Niklaus Schiess as the original reporter.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack 7 x86_64
Fixes
- BZ - 1375147 - CVE-2016-6519 openstack-manila-ui: persistent XSS in metadata field
CVEs
Red Hat OpenStack 7
SRPM | |
---|---|
openstack-manila-ui-1.0.1-3.el7ost.src.rpm | SHA-256: 63430ead3b4c17b9c3bcb0445eba80ece75579e166f175fd491e466f1d42524b |
x86_64 | |
openstack-manila-ui-1.0.1-3.el7ost.noarch.rpm | SHA-256: 4d966155f3c0e7105ec3b822878cc34036906033cf7dc17cfdc38e9eb30f9e68 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.