CVE-2020-10753

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
HTTP Request/Response Splitting
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
redhatCNA
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
redhatceph_storage
3.0
redhatceph_storage
4.0
opensuseleap
15.1
linuxfoundationceph
𝑥
< 14.2.21
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ceph
bullseye
14.2.21-1
fixed
jessie
no-dsa
bookworm
16.2.11+ds-2
fixed
sid
18.2.4+ds-7
fixed
trixie
18.2.4+ds-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
noble
Fixed 15.2.5-0ubuntu1
released
mantic
Fixed 15.2.5-0ubuntu1
released
lunar
Fixed 15.2.5-0ubuntu1
released
kinetic
Fixed 15.2.5-0ubuntu1
released
jammy
Fixed 15.2.5-0ubuntu1
released
impish
Fixed 15.2.5-0ubuntu1
released
hirsute
Fixed 15.2.5-0ubuntu1
released
groovy
Fixed 15.2.5-0ubuntu1
released
focal
Fixed 15.2.7-0ubuntu0.20.04.2
released
eoan
ignored
bionic
Fixed 12.2.13-0ubuntu0.18.04.4
released
xenial
Fixed 10.2.11-0ubuntu0.16.04.3
released
trusty
needed