First published: Fri Jun 26 2020(Updated: )
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ceph Storage | =3.0 | |
Redhat Ceph Storage | =4.0 | |
Redhat Openstack | =15 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
Linuxfoundation Ceph | <14.2.21 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/ceph | 14.2.21-1 16.2.11+ds-2 18.2.4+ds-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10753 is a vulnerability found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) related to the injection of HTTP headers via a CORS ExposeHeader tag.
The severity of CVE-2020-10753 is medium with a severity value of 6.5.
The following software versions are affected by CVE-2020-10753: Red Hat Ceph Storage 3.0 and 4.0, Red Hat Openstack 15, Fedoraproject Fedora 32, openSUSE Leap 15.1, Linuxfoundation Ceph up to version 14.2.21, Canonical Ubuntu Linux 16.04 and 18.04.
The vulnerability in CVE-2020-10753 is caused by a newline character in the ExposeHeader tag in the CORS configuration file, which leads to header injection in the response.
Yes, here are some references related to CVE-2020-10753: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10753), [OpenSUSE Security Announce](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00062.html), [Fedora Project Mailing List](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFU7LXEL2UZE565FJBTY7UGH2O7ZUBVS/).