[Openstack-security] [Bug 1651679] Re: horizon auth switch redir DoS

Jeremy Stanley fungi at yuggoth.org
Wed May 24 14:29:21 UTC 2017


There's been no input whatsoever from Horizon devs, but since the
reporter already seems to have agreed in comment #7 and this has been
open for over 5 months now let's just press forward.

** Description changed:

- This issue is being treated as a potential security risk under embargo.
- Please do not make any public mention of embargoed (private) security
- vulnerabilities before their coordinated publication by the OpenStack
- Vulnerability Management Team in the form of an official OpenStack
- Security Advisory. This includes discussion of the bug or associated
- fixes in public forums such as mailing lists, code review systems and
- bug trackers. Please also avoid private disclosure to other individuals
- not already approved for access to this information, and provide this
- same reminder to those who are made aware of the issue prior to
- publication. All discussion should remain confined to this private bug
- report, and any proposed fixes should be added to the bug as
- attachments.
- 
- --
- 
  It is possible to construct URLs and embed them in unrelated websites
  like this
  
  <iframe width="95%" height="600"
  src="https://dashboard.cloud.suse.de/auth/switch/144e6d002e1541f2b1397814760f2e1e/?next=/auth/switch/144e6d002e1541f2b1397814760f2e1e/%3Fnext=/auth/switch/144e6d002e1541f2b1397814760f2e1e/%3Fnext=/auth/switch/144e6d002e1541f2b1397814760f2e1e/%3Fnext=/project/instances/567e5689-145a-4843-9ba0-4800ac9bb26b/"></iframe>
  
  and when a logged-in user loads such a page (tested with Firefox), it
  generates load on the horizon server without being visible to the user.
  
  I addition to the SSL overhead, this also creates one token per
  redirect. In Liberty this token was immediately revoked and in Newton it
  is not (so IMHO even worse).
  
  This can slow the DB down until tokens expire and cron runs again
  su keystone -s /bin/bash -c "/usr/bin/keystone-manage --config-file /etc/keystone/keystone.conf token_flush" || :

** Information type changed from Private Security to Public

** Tags added: security

** Changed in: ossa
       Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of OpenStack
Security, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1651679

Title:
  horizon auth switch redir DoS

Status in django-openstack-auth:
  New
Status in OpenStack Dashboard (Horizon):
  New
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  It is possible to construct URLs and embed them in unrelated websites
  like this

  <iframe width="95%" height="600"
  src="https://dashboard.cloud.suse.de/auth/switch/144e6d002e1541f2b1397814760f2e1e/?next=/auth/switch/144e6d002e1541f2b1397814760f2e1e/%3Fnext=/auth/switch/144e6d002e1541f2b1397814760f2e1e/%3Fnext=/auth/switch/144e6d002e1541f2b1397814760f2e1e/%3Fnext=/project/instances/567e5689-145a-4843-9ba0-4800ac9bb26b/"></iframe>

  and when a logged-in user loads such a page (tested with Firefox), it
  generates load on the horizon server without being visible to the
  user.

  I addition to the SSL overhead, this also creates one token per
  redirect. In Liberty this token was immediately revoked and in Newton
  it is not (so IMHO even worse).

  This can slow the DB down until tokens expire and cron runs again
  su keystone -s /bin/bash -c "/usr/bin/keystone-manage --config-file /etc/keystone/keystone.conf token_flush" || :

To manage notifications about this bug go to:
https://bugs.launchpad.net/django-openstack-auth/+bug/1651679/+subscriptions




More information about the Openstack-security mailing list