CVE-2021-3654
Description
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Open redirect vulnerability in OpenStack Nova's noVNC console proxy allows attackers to redirect users to arbitrary URLs via crafted requests.
Vulnerability
An open redirect vulnerability exists in OpenStack Nova's console proxy, noVNC, due to improper handling of specially crafted URLs. The issue resides in the WebSockifyRequestHandler, which extends Python's http.server.SimpleHTTPRequestHandler. Certain malformed paths can cause the proxy to return a 301 redirect to an attacker-controlled destination. This affects Nova versions prior to 21.2.3, 22.0.0 through 22.2.2, and 23.0.0 through 23.0.1 [1][4].
Exploitation
An attacker can craft a malicious URL that, when visited by a user (e.g., via a phishing link), causes the noVNC proxy to issue an HTTP redirect to an arbitrary external site. No authentication or special network position is required; the attacker only needs to convince a user to click the crafted URL [3][4]. The redirect is based on the same underlying behavior as Python's SimpleHTTPRequestHandler, which can redirect to URLs beginning with // [2].
Impact
Successful exploitation allows an attacker to redirect users to any untrusted site, enabling phishing or other social engineering attacks. This is a confidentiality and integrity impact—users may be tricked into disclosing credentials or visiting malicious content. The compromise is limited to redirection; the attacker does not gain control of the Nova service or the underlying system [1][4].
Mitigation
Updates are available to fix the vulnerability. Nova administrators should upgrade to version 21.2.3 (for Stein), 22.2.3 (for Train/Ussuri), or 23.0.2 (for Victoria) as appropriate [3][4]. No workarounds are documented for unpatched deployments. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
novaPyPI | < 21.2.3 | 21.2.3 |
novaPyPI | >= 22.0.0, < 22.2.3 | 22.2.3 |
novaPyPI | >= 23.0.0, < 23.0.3 | 23.0.3 |
Affected products
2- openstack-nova/noVNCdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- github.com/advisories/GHSA-vqp6-j452-j6wpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-3654ghsaADVISORY
- security.gentoo.org/glsa/202305-02ghsavendor-advisoryWEB
- bugs.launchpad.net/nova/+bug/1927677ghsaWEB
- bugs.python.org/issue32084ghsaWEB
- bugzilla.redhat.com/show_bug.cgighsaWEB
- opendev.org/openstack/novaghsaPACKAGE
- opendev.org/openstack/nova/commit/04d48527b62a35d912f93bc75613a6cca606df66ghsaWEB
- opendev.org/openstack/nova/commit/8906552cfc2525a44251d4cf313ece61e57251ebghsaWEB
- security.openstack.org/ossa/OSSA-2021-002.htmlghsaWEB
- www.openwall.com/lists/oss-security/2021/07/29/2ghsaWEB
News mentions
0No linked articles in our index yet.