Stored XSS for /admin/users/
Bug #1320233 reported by
michael xin
This bug report is a duplicate of:
Bug #1320235: [OSSA 2014-023] Stored XSS for /admin/users/ (CVE-2014-3475).
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Dashboard (Horizon) |
New
|
Undecided
|
Unassigned | ||
OpenStack Security Advisory |
Incomplete
|
Undecided
|
Unassigned |
Bug Description
The /admin/users/ page does not output encode users' email addresses correctly. Since there is no user input validation for the users' email address during creation process. It is possible to inject script tag into the email address. This is a stored cross site scripting issue.
The issue can be abused to hijack user's session and implant malware, etc.
For example, attached is a screen copy of Horizon for users with stored XSS in action.
Changed in ossa: | |
status: | New → Incomplete |
information type: | Private Security → Public Security |
To post a comment you must log in.