CVE Vulnerabilities

CVE-2021-3524

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: May 17, 2021 | Modified: Nov 07, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of r as a header separator, thus a new flaw has been created.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Ceph Redhat * 14.2.21 (excluding)
Ceph_storage Redhat 4.0 (including) 4.0 (including)
Red Hat Ceph Storage 4.3 RedHat ceph-2:14.2.22-110.el8cp *
Red Hat Ceph Storage 5.1 RedHat ceph-2:16.2.7-98.el8cp *
Ceph Ubuntu bionic *
Ceph Ubuntu devel *
Ceph Ubuntu esm-infra-legacy/trusty *
Ceph Ubuntu esm-infra/xenial *
Ceph Ubuntu focal *
Ceph Ubuntu groovy *
Ceph Ubuntu hirsute *
Ceph Ubuntu impish *
Ceph Ubuntu jammy *
Ceph Ubuntu kinetic *
Ceph Ubuntu lunar *
Ceph Ubuntu mantic *
Ceph Ubuntu noble *
Ceph Ubuntu oracular *
Ceph Ubuntu precise/esm *
Ceph Ubuntu trusty *
Ceph Ubuntu trusty/esm *
Ceph Ubuntu upstream *
Ceph Ubuntu xenial *

Potential Mitigations

References