A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of r as a header separator, thus a new flaw has been created.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ceph | Redhat | * | 14.2.21 (excluding) |
Ceph_storage | Redhat | 4.0 (including) | 4.0 (including) |
Red Hat Ceph Storage 4.3 | RedHat | ceph-2:14.2.22-110.el8cp | * |
Red Hat Ceph Storage 5.1 | RedHat | ceph-2:16.2.7-98.el8cp | * |
Ceph | Ubuntu | bionic | * |
Ceph | Ubuntu | devel | * |
Ceph | Ubuntu | esm-infra-legacy/trusty | * |
Ceph | Ubuntu | esm-infra/xenial | * |
Ceph | Ubuntu | focal | * |
Ceph | Ubuntu | groovy | * |
Ceph | Ubuntu | hirsute | * |
Ceph | Ubuntu | impish | * |
Ceph | Ubuntu | jammy | * |
Ceph | Ubuntu | kinetic | * |
Ceph | Ubuntu | lunar | * |
Ceph | Ubuntu | mantic | * |
Ceph | Ubuntu | noble | * |
Ceph | Ubuntu | oracular | * |
Ceph | Ubuntu | precise/esm | * |
Ceph | Ubuntu | trusty | * |
Ceph | Ubuntu | trusty/esm | * |
Ceph | Ubuntu | upstream | * |
Ceph | Ubuntu | xenial | * |