vulnerability
SUSE: CVE-2021-3524: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | May 17, 2021 | Jun 3, 2021 | Oct 26, 2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
May 17, 2021
Added
Jun 3, 2021
Modified
Oct 26, 2022
Description
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
Solution(s)
suse-upgrade-cephsuse-upgrade-ceph-basesuse-upgrade-ceph-commonsuse-upgrade-ceph-fusesuse-upgrade-ceph-grafana-dashboardssuse-upgrade-ceph-immutable-object-cachesuse-upgrade-ceph-mdssuse-upgrade-ceph-mgrsuse-upgrade-ceph-mgr-cephadmsuse-upgrade-ceph-mgr-dashboardsuse-upgrade-ceph-mgr-diskprediction-cloudsuse-upgrade-ceph-mgr-diskprediction-localsuse-upgrade-ceph-mgr-k8seventssuse-upgrade-ceph-mgr-modules-coresuse-upgrade-ceph-mgr-rooksuse-upgrade-ceph-monsuse-upgrade-ceph-osdsuse-upgrade-ceph-prometheus-alertssuse-upgrade-ceph-radosgwsuse-upgrade-ceph-testsuse-upgrade-cephadmsuse-upgrade-cephfs-shellsuse-upgrade-libcephfs-develsuse-upgrade-libcephfs2suse-upgrade-librados-develsuse-upgrade-librados2suse-upgrade-libradospp-develsuse-upgrade-librbd-develsuse-upgrade-librbd1suse-upgrade-librgw-develsuse-upgrade-librgw2suse-upgrade-python3-ceph-argparsesuse-upgrade-python3-ceph-commonsuse-upgrade-python3-cephfssuse-upgrade-python3-radossuse-upgrade-python3-rbdsuse-upgrade-python3-rgwsuse-upgrade-rados-objclass-develsuse-upgrade-rbd-fusesuse-upgrade-rbd-mirrorsuse-upgrade-rbd-nbd

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.