Security Advisory Low: python-django-horizon security update

Advisory: RHSA-2012:1380-1
Type: Security Advisory
Severity: Low
Issued on: 2012-10-16
Last updated on: 2012-10-16
Affected Products: Red Hat OpenStack Essex
CVEs ( CVE-2012-3540


Updated python-django-horizon packages that fix one security issue are now
available for Red Hat OpenStack Essex.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Horizon is the OpenStack Dashboard (, a web
interface for managing OpenStack services.

An open redirect flaw was found in the way Horizon handled authentication.
A remote attacker able to trick a victim into opening the Horizon login
page using a specially-crafted link could redirect the victim to an
arbitrary web page, and conduct phishing attacks, after the victim
successfully logs in. (CVE-2012-3540)

Red Hat would like to thank Thomas Biege of SUSE for reporting this issue.

All users of Horizon are advised to upgrade to these updated packages,
which correct this issue. After installing the updated packages, the httpd
daemon must be restarted ("service httpd restart") for the update to take


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Updated packages

Red Hat OpenStack Essex

File outdated by:  RHBA-2012:1568
    MD5: f77da1ecd42669a75ada6bf309a3b144
SHA-256: 7b12057d846bbf4ebbb0f2b4e1d9f8895d08ea3d984321a9a6fbe5fe91c784a2
File outdated by:  RHBA-2012:1568
    MD5: 7988e541d4744c39caf3464a30fed088
SHA-256: 4eb94ed3b2d8f84aa8258e0600384f3f1e5213b0923d414e0fc4c2277da920c3
File outdated by:  RHBA-2012:1568
    MD5: cf87f910f54019e248eb7cd060030266
SHA-256: fff787be498e64b030f0a5ca880151dba8aa685a12b7e45e114de43fbf9ff32a
File outdated by:  RHBA-2012:1568
    MD5: d9f71ec0e251e72ba3a73f85b3fc3f75
SHA-256: 647bf01ec95438a030d2b8b00ee8a539bd4df3b4ed67282928b0b1d8204aa3aa
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

852246 - CVE-2012-3540 OpenStack-Horizon: Open redirect through 'next' parameter


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at