First published: Thu Apr 23 2020(Updated: )
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Ceph | <14.2.21 | |
Redhat Ceph Storage | =3.0 | |
Redhat Ceph Storage | =4.0 | |
Redhat Openshift Container Platform | =4.2 | |
Fedoraproject Fedora | =31 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
debian/ceph | 14.2.21-1 16.2.11+ds-2 18.2.4+ds-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1760 is a vulnerability in the Ceph Object Gateway that allows potential XSS attacks due to the lack of proper neutralization of untrusted input.
CVE-2020-1760 allows for potential XSS attacks in the Ceph Object Gateway when it supports requests sent by an anonymous user in Amazon S3.
CVE-2020-1760 has a severity rating of medium with a CVSS score of 6.1.
To fix CVE-2020-1760, update your Ceph Object Gateway to one of the following versions: 14.2.21-1, 16.2.11+ds-2, or 16.2.11+ds-5.
You can find more information about CVE-2020-1760 in the following references: [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1760), [Debian LTS Announcement](https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html), [Fedora Project Archive](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/).