<div dir="ltr">-----BEGIN PGP SIGNED MESSAGE-----<br>Hash: SHA512<br><br>==============================================<br>OSSA-2020-008: Open redirect in workflow forms<br>==============================================<br><br>:Date: December 03, 2020<br>:CVE: CVE-2020-29565<br><br><br>Affects<br>~~~~~~~<br>- - Horizon:  <15.3.2, >=16.0.0 <16.2.1, >=17.0.0 <18.3.3, >=18.4.0 <18.6.0<br><br><br>Description<br>~~~~~~~~~~~<br>Pritam Singh (Red Hat) reported a vulnerability in Horizon's workflow<br>forms. Previously there was a lack of validation on the "next"<br>parameter, which would allow someone to supply a malicious URL in<br>Horizon that can cause an automatic redirect to the provided malicious<br>URL.<br><br><br>Patches<br>~~~~~~~<br>- - <a href="https://review.opendev.org/758843">https://review.opendev.org/758843</a> (Stein)<br>- - <a href="https://review.opendev.org/758841">https://review.opendev.org/758841</a> (Train)<br><br><br>Credits<br>~~~~~~~<br>- - Pritam Singh from Red Hat (CVE-2020-29565)<br><br><br>References<br>~~~~~~~~~~<br>- - <a href="https://launchpad.net/bugs/1865026">https://launchpad.net/bugs/1865026</a><br>- - <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29565">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29565</a><br>-----BEGIN PGP SIGNATURE-----<br><br>iQIzBAEBCgAdFiEEWa125cLHIuv6ekof56j9K3b+vREFAl/OrjwACgkQ56j9K3b+<br>vRG/Gg//Tyj5La8eFwIrwhpDbV/tKNFS+t3NzuhJzLS24WNS9cLf5yDronRdBPdT<br>Ow2OegTZ7K5GyoRARpycTjtE66RIizX9I8Kx27FXPc83hLYYOs/MButYpqcp0swM<br>687RXZGFcZ5HZtPuRuTcclEcyhzvcUX7HXmznOCmVOHchr+RXzmp6cXC7tyCuNkV<br>cGuuMtptDfkFmn2MpGmiTWEiMusMRbV5HqeyY39jg5dwph0kbMCcuzkX6c2WHubE<br>T+rjVKbmqHr+v7og6mkZoK+pVk6Ulta/lGsYh/0NlszdQw3poN4FIt//TIwJZVwx<br>WSlbMt6IwBW5XiPXvjpX9Awis6CT0jxlIV5XBq+klr3Jo+YnDsChElIPQs3CRKoM<br>vqXVextHCk3LK1Evs3FkBns2Taro4tWOlkGYKR6INT4F1TJKNIzIUiF08673uF3B<br>8zXDfnVEb7tEMqwu6OdVnfQQ4SRu7uyrN1sHhtwIyfK10AAI7gfJL/wbItJy21Om<br>SQahTfDnikEY5gYYU+NH0LBMXkE0I/T+uvPh4LgP7wUxCMR9uI8+iA0711Gp/aPD<br>WUdm3pUfIJYE7Gq6sT7BJQftHyMPcxOBj+MIrmFDFOxyPV70Mub+f34zxdu3Qoda<br>tZNpy/BGL19VqrlRa9R8H65tzzNy7k5GqkaUYEF5/LegfUgZOTo=<br>=jr+k<br>-----END PGP SIGNATURE-----<br></div>