Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3524
HistoryMay 17, 2021 - 12:00 a.m.

CVE-2021-3524

2021-05-1700:00:00
ubuntu.com
ubuntu.com
14

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.005 Low

EPSS

Percentile

76.7%

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway)
in versions before 14.2.21. The vulnerability is related to the injection
of HTTP headers via a CORS ExposeHeader tag. The newline character in the
ExposeHeader tag in the CORS configuration file generates a header
injection in the response when the CORS request is made. In addition, the
prior bug fix for CVE-2020-10753 did not account for the use of \r as a
header separator, thus a new flaw has been created.

Bugs

Notes

Author Note
mdeslaur this is fixed in 16.2.4 in hirsute-updates but has not been pushed to the security pocket
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchceph< 12.2.13-0ubuntu0.18.04.10UNKNOWN
ubuntu20.04noarchceph< 15.2.12-0ubuntu0.20.04.1UNKNOWN
ubuntu20.10noarchceph< 15.2.12-0ubuntu0.20.10.1UNKNOWN
ubuntu21.04noarchceph< 16.2.6-0ubuntu0.21.04.2UNKNOWN
ubuntu21.10noarchceph< 16.2.4-0ubuntu1UNKNOWN
ubuntu22.04noarchceph< 16.2.4-0ubuntu1UNKNOWN
ubuntu22.10noarchceph< 16.2.4-0ubuntu1UNKNOWN
ubuntu23.04noarchceph< 16.2.4-0ubuntu1UNKNOWN
ubuntu23.10noarchceph< 16.2.4-0ubuntu1UNKNOWN
ubuntu24.04noarchceph< 16.2.4-0ubuntu1UNKNOWN
Rows per page:
1-10 of 121

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.005 Low

EPSS

Percentile

76.7%