|
Message-ID: <20201016170329.GB84510@raider.home>
Date: Fri, 16 Oct 2020 19:03:29 +0200
From: Pierre Riteau <pierre@...ckhpc.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA-2020-007] Blazar: Remote code execution in blazar-dashboard
(CVE-2020-26943)
========================================================
OSSA-2020-007: Remote code execution in blazar-dashboard
========================================================
:Date: October 12, 2020
:CVE: CVE-2020-26943
Affects
~~~~~~~
- Blazar-dashboard: <1.3.1, ==2.0.0, ==3.0.0
Description
~~~~~~~~~~~
Lukas Euler (Positive Security) reported a vulnerability in
blazar-dashboard. A user allowed to access the Blazar dashboard in
Horizon may trigger code execution on the Horizon host as the user the
Horizon service runs under. This may result in Horizon host
unauthorized access and further compromise of the Horizon service. All
setups using the Horizon dashboard with the blazar-dashboard plugin
are affected.
Patches
~~~~~~~
- https://review.opendev.org/755814 (Stein)
- https://review.opendev.org/755813 (Train)
- https://review.opendev.org/755812 (Ussuri)
- https://review.opendev.org/756064 (Victoria)
- https://review.opendev.org/755810 (Wallaby)
Credits
~~~~~~~
- Lukas Euler from Positive Security (CVE-2020-26943)
References
~~~~~~~~~~
- https://launchpad.net/bugs/1895688
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26943
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.