CVE-2020-29565: OpenStack Horizon Open redirect in workflow forms
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71302%
CWE
Published
5/24/2022
Updated
9/20/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| horizon | pip | < 15.3.2 | 15.3.2 |
| horizon | pip | >= 16.0.0, < 16.2.1 | 16.2.1 |
| horizon | pip | >= 17.0.0, < 18.3.3 | 18.3.3 |
| horizon | pip | >= 18.4.0, < 18.6.0 | 18.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insufficient validation of the 'next' parameter in workflow forms. The commit diff shows the vulnerable code in horizon/workflows/views.py's get_context_data method previously set context['REDIRECT_URL'] directly from request.GET without security checks. The patch added validation using django.utils.http.is_safe_url, confirming this was the vulnerable point. The workflow forms' redirect handling is explicitly mentioned in CVE descriptions and commit messages, making this the clear attack vector.