First published: Wed Aug 01 2018(Updated: )
A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request. Ceph branches 1.3.x and 2.x are affected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ceph Storage | =1.3 | |
Redhat Ceph Storage Mon | =1.3 | |
Redhat Ceph Storage Mon | =2 | |
Redhat Ceph Storage Osd | =1.3 | |
Redhat Ceph Storage Osd | =2 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Ceph Storage | =2.0 | |
Canonical Ubuntu Linux | =16.04 | |
Redhat Enterprise Linux | =7.0 | |
Canonical Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-9579.
The severity level of CVE-2016-9579 is high.
The software affected by CVE-2016-9579 includes Ceph Storage versions 1.3 and 2, Ceph Storage Mon 1.3 and 2, and Ceph Storage Osd 1.3 and 2.
An attacker can exploit CVE-2016-9579 by sending a specially-crafted cross-origin HTTP request.
No, Ubuntu Linux and Redhat Enterprise Linux are not vulnerable to CVE-2016-9579.