CVE-2021-3524

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
VendorProductVersion
redhatceph
𝑥
< 14.2.21
redhatceph_storage
4.0
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ceph
bullseye
14.2.21-1
fixed
bookworm
16.2.11+ds-2
fixed
sid
18.2.4+ds-7
fixed
trixie
18.2.4+ds-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
noble
Fixed 16.2.4-0ubuntu1
released
mantic
Fixed 16.2.4-0ubuntu1
released
lunar
Fixed 16.2.4-0ubuntu1
released
kinetic
Fixed 16.2.4-0ubuntu1
released
jammy
Fixed 16.2.4-0ubuntu1
released
impish
Fixed 16.2.4-0ubuntu1
released
hirsute
Fixed 16.2.6-0ubuntu0.21.04.2
released
groovy
Fixed 15.2.12-0ubuntu0.20.10.1
released
focal
Fixed 15.2.12-0ubuntu0.20.04.1
released
bionic
Fixed 12.2.13-0ubuntu0.18.04.10
released
xenial
needed
trusty
needed