vulnerability
SUSE: CVE-2020-10753: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jun 25, 2020 | Jun 26, 2020 | Oct 22, 2021 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jun 25, 2020
Added
Jun 26, 2020
Modified
Oct 22, 2021
Description
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
Solutions
suse-upgrade-cephsuse-upgrade-ceph-basesuse-upgrade-ceph-commonsuse-upgrade-ceph-dashboard-e2esuse-upgrade-ceph-fusesuse-upgrade-ceph-grafana-dashboardssuse-upgrade-ceph-mdssuse-upgrade-ceph-mgrsuse-upgrade-ceph-mgr-dashboardsuse-upgrade-ceph-mgr-diskprediction-cloudsuse-upgrade-ceph-mgr-diskprediction-localsuse-upgrade-ceph-mgr-k8seventssuse-upgrade-ceph-mgr-rooksuse-upgrade-ceph-mgr-sshsuse-upgrade-ceph-monsuse-upgrade-ceph-osdsuse-upgrade-ceph-prometheus-alertssuse-upgrade-ceph-radosgwsuse-upgrade-ceph-resource-agentssuse-upgrade-ceph-testsuse-upgrade-cephfs-shellsuse-upgrade-libcephfs-develsuse-upgrade-libcephfs2suse-upgrade-librados-develsuse-upgrade-librados2suse-upgrade-libradospp-develsuse-upgrade-libradosstriper-develsuse-upgrade-libradosstriper1suse-upgrade-librbd-develsuse-upgrade-librbd1suse-upgrade-librgw-develsuse-upgrade-librgw2suse-upgrade-python-cephfssuse-upgrade-python-radossuse-upgrade-python-rbdsuse-upgrade-python-rgwsuse-upgrade-python3-ceph-argparsesuse-upgrade-python3-cephfssuse-upgrade-python3-radossuse-upgrade-python3-rbdsuse-upgrade-python3-rgwsuse-upgrade-rados-objclass-develsuse-upgrade-rbd-fusesuse-upgrade-rbd-mirrorsuse-upgrade-rbd-nbd
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.