Vulnerability Details : CVE-2014-7851
oVirt 3.2.2 through 3.5.0 does not invalidate the restapi session after logout from the webadmin, which allows remote authenticated users with knowledge of another user's session data to gain that user's privileges by replacing their session token with that of another user.
Exploit prediction scoring system (EPSS) score for CVE-2014-7851
Probability of exploitation activity in the next 30 days: 0.15%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-7851
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST |
CWE ids for CVE-2014-7851
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7851
-
https://bugzilla.redhat.com/show_bug.cgi?id=1161730
1161730 – Logout must logout all sessionsIssue Tracking
-
https://bugzilla.redhat.com/show_bug.cgi?id=1165311
1165311 – (CVE-2014-7851) CVE-2014-7851 ovirt-engine-webadmin: does not invalidate all sessions upon logoutIssue Tracking
Products affected by CVE-2014-7851
- cpe:2.3:a:redhat:ovirt-engine:3.3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.2:beta1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.3:beta1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3.4:beta1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.3:beta1:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ovirt-engine:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:ovirt:ovirt:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:ovirt:ovirt:3.3.2:*:*:*:*:*:*:*