Another Horizon login page vulnerability to a DoS attack
Bug #1457551 reported by
Timur Sufiev
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Dashboard (Horizon) |
Won't Fix
|
Critical
|
Paul Karikh | ||
OpenStack Security Advisory |
Won't Fix
|
Undecided
|
Unassigned | ||
OpenStack Security Notes |
Fix Released
|
Medium
|
Robert Clark |
Bug Description
This bug is very similar to: https:/
Steps to reproduce:
1) Setup Horizon to use db as session engine (using this doc: http://
2) Run 'for i in {1..100}; do curl -b "sessionid=aaaaa;" http://
I've got 100 rows in django_session after this.
I've used devstack installation just with updated master branch.
Changed in horizon: | |
importance: | Undecided → Critical |
assignee: | nobody → Paul Karikh (pkarikh) |
Changed in ossa: | |
status: | New → Incomplete |
tags: | added: security |
Changed in horizon: | |
status: | New → Won't Fix |
Changed in ossn: | |
status: | New → Fix Committed |
importance: | Undecided → Medium |
To post a comment you must log in.
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions.
The Horizon Liaison and Paul McMillan have been subscribed. Is this a regression or this case was not covered by previous patch ( https:/ /review. openstack. org/#/c/ 140358/ 1 ) ?