Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:12238
HistoryJan 15, 2019 - 9:14 a.m.

Cross-origin Resource Sharing Policy Bypass

2019-01-1509:14:40
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
7

0.007 Low

EPSS

Percentile

80.0%

Red Hat Ceph Storage is found to be vulnerable to cross-origin resource sharing policy bypass. The vulnerability is due to the setting which allows origin on a bucket, opening up a loophole for an attacker to use malicious cross-origin HTTP request to launch denial of service.