VYPR
Medium severity5.4NVD Advisory· Published Jul 12, 2016· Updated May 6, 2026

CVE-2016-4428

CVE-2016-4428

Description

Cross-site scripting (XSS) vulnerability in OpenStack Dashboard (Horizon) 8.0.1 and earlier and 9.0.0 through 9.0.1 allows remote authenticated users to inject arbitrary web script or HTML by injecting an AngularJS template in a dashboard form.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
horizonPyPI
< 8.0.28.0.2
horizonPyPI
>= 9.0.0, < 9.1.09.1.0

Affected products

25

Patches

3
fc8d70560401

Escape angularjs templating in unsafe HTML

https://github.com/openstack/horizonRichard JonesMay 3, 2016via ghsa
3 files changed · +40 0
  • horizon/utils/escape.py+31 0 added
    @@ -0,0 +1,31 @@
    +# Copyright 2016, Rackspace, US, Inc.
    +#
    +# Licensed under the Apache License, Version 2.0 (the "License");
    +# you may not use this file except in compliance with the License.
    +# You may obtain a copy of the License at
    +#
    +#    http://www.apache.org/licenses/LICENSE-2.0
    +#
    +# Unless required by applicable law or agreed to in writing, software
    +# distributed under the License is distributed on an "AS IS" BASIS,
    +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    +# See the License for the specific language governing permissions and
    +# limitations under the License.
    +
    +import django.utils.html
    +
    +
    +def escape(text, existing=django.utils.html.escape):
    +    # Replace our angular markup string with a different string
    +    # (which just happens to be the Django comment string)
    +    # this prevents user-supplied data from being intepreted in
    +    # our pages by angularjs, thus preventing it from being used
    +    # for XSS attacks. Note that we use {$ $} instead of the
    +    # standard {{ }} - this is configured in horizon.framework
    +    # angularjs module through $interpolateProvider.
    +    return existing(text).replace('{$', '{%').replace('$}', '%}')
    +
    +
    +# this will be invoked as early as possible in settings.py
    +def monkeypatch_escape():
    +    django.utils.html.escape = escape
    
  • openstack_dashboard/settings.py+3 0 modified
    @@ -29,6 +29,9 @@
     from openstack_dashboard.static_settings import get_staticfiles_dirs  # noqa
     from openstack_dashboard import theme_settings
     
    +from horizon.utils.escape import monkeypatch_escape
    +
    +monkeypatch_escape()
     
     warnings.formatwarning = lambda message, category, *args, **kwargs: \
         '%s: %s' % (category.__name__, message)
    
  • openstack_dashboard/test/settings.py+6 0 modified
    @@ -18,6 +18,12 @@
     from openstack_dashboard.static_settings import find_static_files  # noqa
     from openstack_dashboard.static_settings import get_staticfiles_dirs  # noqa
     
    +from horizon.utils.escape import monkeypatch_escape
    +
    +# this is used to protect from client XSS attacks, but it's worth
    +# enabling in our test setup to find any issues it might cause
    +monkeypatch_escape()
    +
     STATICFILES_DIRS = get_staticfiles_dirs()
     
     TEST_DIR = os.path.dirname(os.path.abspath(__file__))
    
d585e5eb9acf

Escape angularjs templating in unsafe HTML

https://github.com/openstack/horizonRichard JonesMay 3, 2016via ghsa
3 files changed · +40 0
  • horizon/utils/escape.py+31 0 added
    @@ -0,0 +1,31 @@
    +# Copyright 2016, Rackspace, US, Inc.
    +#
    +# Licensed under the Apache License, Version 2.0 (the "License");
    +# you may not use this file except in compliance with the License.
    +# You may obtain a copy of the License at
    +#
    +#    http://www.apache.org/licenses/LICENSE-2.0
    +#
    +# Unless required by applicable law or agreed to in writing, software
    +# distributed under the License is distributed on an "AS IS" BASIS,
    +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    +# See the License for the specific language governing permissions and
    +# limitations under the License.
    +
    +import django.utils.html
    +
    +
    +def escape(text, existing=django.utils.html.escape):
    +    # Replace our angular markup string with a different string
    +    # (which just happens to be the Django comment string)
    +    # this prevents user-supplied data from being intepreted in
    +    # our pages by angularjs, thus preventing it from being used
    +    # for XSS attacks. Note that we use {$ $} instead of the
    +    # standard {{ }} - this is configured in horizon.framework
    +    # angularjs module through $interpolateProvider
    +    return existing(text).replace('{$', '{%').replace('$}', '%}')
    +
    +
    +# this will be invoked as early as possible in settings.py
    +def monkeypatch_escape():
    +    django.utils.html.escape = escape
    
  • openstack_dashboard/settings.py+3 0 modified
    @@ -28,6 +28,9 @@
     from openstack_dashboard.static_settings import find_static_files  # noqa
     from openstack_dashboard.static_settings import get_staticfiles_dirs  # noqa
     
    +from horizon.utils.escape import monkeypatch_escape
    +
    +monkeypatch_escape()
     
     warnings.formatwarning = lambda message, category, *args, **kwargs: \
         '%s: %s' % (category.__name__, message)
    
  • openstack_dashboard/test/settings.py+6 0 modified
    @@ -18,6 +18,12 @@
     from openstack_dashboard.static_settings import find_static_files  # noqa
     from openstack_dashboard.static_settings import get_staticfiles_dirs  # noqa
     
    +from horizon.utils.escape import monkeypatch_escape
    +
    +# this is used to protect from client XSS attacks, but it's worth
    +# enabling in our test setup to find any issues it might cause
    +monkeypatch_escape()
    +
     STATICFILES_DIRS = get_staticfiles_dirs()
     
     TEST_DIR = os.path.dirname(os.path.abspath(__file__))
    
62b4e6f30a7a

Escape angularjs templating in unsafe HTML

https://github.com/openstack/horizonRichard JonesMay 3, 2016via ghsa
3 files changed · +40 0
  • horizon/utils/escape.py+31 0 added
    @@ -0,0 +1,31 @@
    +# Copyright 2016, Rackspace, US, Inc.
    +#
    +# Licensed under the Apache License, Version 2.0 (the "License");
    +# you may not use this file except in compliance with the License.
    +# You may obtain a copy of the License at
    +#
    +#    http://www.apache.org/licenses/LICENSE-2.0
    +#
    +# Unless required by applicable law or agreed to in writing, software
    +# distributed under the License is distributed on an "AS IS" BASIS,
    +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    +# See the License for the specific language governing permissions and
    +# limitations under the License.
    +
    +import django.utils.html
    +
    +
    +def escape(text, existing=django.utils.html.escape):
    +    # Replace our angular markup string with a different string
    +    # (which just happens to be the Django comment string)
    +    # this prevents user-supplied data from being intepreted in
    +    # our pages by angularjs, thus preventing it from being used
    +    # for XSS attacks. Note that we use {$ $} instead of the
    +    # standard {{ }} - this is configured in horizon.framework
    +    # angularjs module through $interpolateProvider.
    +    return existing(text).replace('{$', '{%').replace('$}', '%}')
    +
    +
    +# this will be invoked as early as possible in settings.py
    +def monkeypatch_escape():
    +    django.utils.html.escape = escape
    
  • openstack_dashboard/settings.py+3 0 modified
    @@ -29,6 +29,9 @@
     from openstack_dashboard.static_settings import get_staticfiles_dirs  # noqa
     from openstack_dashboard import theme_settings
     
    +from horizon.utils.escape import monkeypatch_escape
    +
    +monkeypatch_escape()
     
     warnings.formatwarning = lambda message, category, *args, **kwargs: \
         '%s: %s' % (category.__name__, message)
    
  • openstack_dashboard/test/settings.py+6 0 modified
    @@ -18,6 +18,12 @@
     from openstack_dashboard.static_settings import find_static_files  # noqa
     from openstack_dashboard.static_settings import get_staticfiles_dirs  # noqa
     
    +from horizon.utils.escape import monkeypatch_escape
    +
    +# this is used to protect from client XSS attacks, but it's worth
    +# enabling in our test setup to find any issues it might cause
    +monkeypatch_escape()
    +
     STATICFILES_DIRS = get_staticfiles_dirs()
     
     TEST_DIR = os.path.dirname(os.path.abspath(__file__))
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

19

News mentions

0

No linked articles in our index yet.