- Issued:
- 2017-07-12
- Updated:
- 2017-07-12
RHSA-2017:1739 - Security Advisory
Synopsis
Low: python-django-horizon security and bug fix update
Type/Severity
Security Advisory: Low
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for python-django-horizon is now available for Red Hat OpenStack Platform 9.0 (Mitaka).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenStack Dashboard (horizon) provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources.
Security Fix(es):
- A cross-site scripting flaw was discovered in the OpenStack dashboard (horizon) which allowed remote authenticated administrators to conduct XSS attacks using a crafted federation mapping rule. For this flaw to be exploited, federation mapping must be enabled in the dashboard. (CVE-2017-7400)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack 9 x86_64
Fixes
- BZ - 1439626 - CVE-2017-7400 python-django-horizon: XSS in federation mappings UI
- BZ - 1457745 - Can not choose flavor in dashboard if glance.min_disk > flavor.disk
CVEs
Red Hat OpenStack 9
SRPM | |
---|---|
python-django-horizon-9.0.1-13.el7ost.src.rpm | SHA-256: 3670efceb2f46d8d3fe986cf9b05bc1a319ba51e3e0bce7446619673aff554b9 |
x86_64 | |
openstack-dashboard-9.0.1-13.el7ost.noarch.rpm | SHA-256: 48c96251fa6deaaff8b7589db76f42aa3c39719aaf0872aa1be1ac620c1f7359 |
openstack-dashboard-theme-9.0.1-13.el7ost.noarch.rpm | SHA-256: 6229e046db7bce35693d32695d6d8d2d4c2251f9a0c5f8f18f0721f9aee60111 |
python-django-horizon-9.0.1-13.el7ost.noarch.rpm | SHA-256: c429d9f1e48127e5616a8faf2aa80886a340dbcc6c02c893256f64a19bb07f30 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.