4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.9 Medium
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
77.8%
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
CPE | Name | Operator | Version |
---|---|---|---|
linuxfoundation:ceph | linuxfoundation ceph | lt | 14.2.21 |
[
{
"vendor": "[UNKNOWN]",
"product": "ceph",
"versions": [
{
"version": "15.2.1",
"status": "affected"
},
{
"version": "14.2.9",
"status": "affected"
},
{
"version": "13.2.9",
"status": "affected"
}
]
}
]
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1760
lists.debian.org/debian-lts-announce/2021/08/msg00013.html
lists.debian.org/debian-lts-announce/2023/10/msg00034.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/
security.gentoo.org/glsa/202105-39
usn.ubuntu.com/4528-1/
www.openwall.com/lists/oss-security/2020/04/07/1
More
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.9 Medium
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
77.8%