Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-4998-1 (CVE-2021-3524): Ceph vulnerabilities

Back to Search

Ubuntu: USN-4998-1 (CVE-2021-3524): Ceph vulnerabilities

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
05/17/2021
Created
06/28/2021
Added
06/25/2021
Modified
06/25/2021

Description

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.

Solution(s)

  • ubuntu-upgrade-ceph
  • ubuntu-upgrade-ceph-base
  • ubuntu-upgrade-ceph-common
  • ubuntu-upgrade-ceph-mgr
  • ubuntu-upgrade-ceph-mgr-cephadm
  • ubuntu-upgrade-ceph-mgr-dashboard
  • ubuntu-upgrade-ceph-mgr-diskprediction-cloud
  • ubuntu-upgrade-ceph-mgr-diskprediction-local
  • ubuntu-upgrade-ceph-mgr-k8sevents
  • ubuntu-upgrade-ceph-mgr-modules-core
  • ubuntu-upgrade-ceph-mgr-rook
  • ubuntu-upgrade-cephadm
  • ubuntu-upgrade-radosgw

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;