Rapid7 Vulnerability & Exploit Database

Centos Linux: CVE-2021-3524: Moderate: Red Hat Ceph Storage 5.1 Security, Enhancement, and Bug Fix update (Multiple Advisories)

Back to Search

Centos Linux: CVE-2021-3524: Moderate: Red Hat Ceph Storage 5.1 Security, Enhancement, and Bug Fix update (Multiple Advisories)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
05/17/2021
Created
04/06/2022
Added
04/05/2022
Modified
05/06/2022

Description

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.

Solution(s)

  • centos-upgrade-ceph-ansible
  • centos-upgrade-ceph-base
  • centos-upgrade-ceph-base-debuginfo
  • centos-upgrade-ceph-common
  • centos-upgrade-ceph-common-debuginfo
  • centos-upgrade-ceph-debuginfo
  • centos-upgrade-ceph-debugsource
  • centos-upgrade-ceph-fuse
  • centos-upgrade-ceph-fuse-debuginfo
  • centos-upgrade-ceph-grafana-dashboards
  • centos-upgrade-ceph-immutable-object-cache
  • centos-upgrade-ceph-immutable-object-cache-debuginfo
  • centos-upgrade-ceph-iscsi
  • centos-upgrade-ceph-mds
  • centos-upgrade-ceph-mds-debuginfo
  • centos-upgrade-ceph-mgr-debuginfo
  • centos-upgrade-ceph-mon-debuginfo
  • centos-upgrade-ceph-osd-debuginfo
  • centos-upgrade-ceph-radosgw
  • centos-upgrade-ceph-radosgw-debuginfo
  • centos-upgrade-ceph-resource-agents
  • centos-upgrade-ceph-selinux
  • centos-upgrade-ceph-test-debuginfo
  • centos-upgrade-cephadm
  • centos-upgrade-cephadm-ansible
  • centos-upgrade-cephfs-mirror
  • centos-upgrade-cephfs-mirror-debuginfo
  • centos-upgrade-cephfs-top
  • centos-upgrade-libcephfs-devel
  • centos-upgrade-libcephfs2
  • centos-upgrade-libcephfs2-debuginfo
  • centos-upgrade-libcephsqlite-debuginfo
  • centos-upgrade-libntirpc
  • centos-upgrade-libntirpc-debuginfo
  • centos-upgrade-libntirpc-debugsource
  • centos-upgrade-librados-devel
  • centos-upgrade-librados-devel-debuginfo
  • centos-upgrade-libradospp-devel
  • centos-upgrade-libradosstriper1
  • centos-upgrade-libradosstriper1-debuginfo
  • centos-upgrade-librbd-devel
  • centos-upgrade-librgw-devel
  • centos-upgrade-librgw2
  • centos-upgrade-librgw2-debuginfo
  • centos-upgrade-libtcmu
  • centos-upgrade-nfs-ganesha
  • centos-upgrade-nfs-ganesha-ceph
  • centos-upgrade-nfs-ganesha-ceph-debuginfo
  • centos-upgrade-nfs-ganesha-debuginfo
  • centos-upgrade-nfs-ganesha-debugsource
  • centos-upgrade-nfs-ganesha-proxy
  • centos-upgrade-nfs-ganesha-proxy-debuginfo
  • centos-upgrade-nfs-ganesha-rados-grace
  • centos-upgrade-nfs-ganesha-rados-grace-debuginfo
  • centos-upgrade-nfs-ganesha-rados-urls
  • centos-upgrade-nfs-ganesha-rados-urls-debuginfo
  • centos-upgrade-nfs-ganesha-rgw
  • centos-upgrade-nfs-ganesha-rgw-debuginfo
  • centos-upgrade-nfs-ganesha-selinux
  • centos-upgrade-nfs-ganesha-vfs
  • centos-upgrade-nfs-ganesha-vfs-debuginfo
  • centos-upgrade-python-ceph-argparse
  • centos-upgrade-python-cephfs
  • centos-upgrade-python-rgw
  • centos-upgrade-python3-ceph-argparse
  • centos-upgrade-python3-ceph-common
  • centos-upgrade-python3-cephfs
  • centos-upgrade-python3-cephfs-debuginfo
  • centos-upgrade-python3-rados
  • centos-upgrade-python3-rados-debuginfo
  • centos-upgrade-python3-rbd
  • centos-upgrade-python3-rbd-debuginfo
  • centos-upgrade-python3-rgw
  • centos-upgrade-python3-rgw-debuginfo
  • centos-upgrade-rbd-fuse-debuginfo
  • centos-upgrade-rbd-mirror
  • centos-upgrade-rbd-mirror-debuginfo
  • centos-upgrade-rbd-nbd
  • centos-upgrade-rbd-nbd-debuginfo
  • centos-upgrade-tcmu-runner

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;