ceph: CVE-2020-10753: radosgw: HTTP header injection via CORS ExposeHeader tag

Related Vulnerabilities: CVE-2020-10753  

Debian Bug report logs - #975300
ceph: CVE-2020-10753: radosgw: HTTP header injection via CORS ExposeHeader tag

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 20 Nov 2020 08:42:01 UTC

Severity: important

Tags: security, upstream

Found in version ceph/14.2.9-1

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Ceph Packaging Team <team+ceph@tracker.debian.org>:
Bug#975300; Package src:ceph. (Fri, 20 Nov 2020 08:42:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Ceph Packaging Team <team+ceph@tracker.debian.org>. (Fri, 20 Nov 2020 08:42:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ceph: CVE-2020-10753: radosgw: HTTP header injection via CORS ExposeHeader tag
Date: Fri, 20 Nov 2020 09:38:49 +0100
Source: ceph
Version: 14.2.9-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for ceph.

CVE-2020-10753[0]:
| A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object
| Gateway). The vulnerability is related to the injection of HTTP
| headers via a CORS ExposeHeader tag. The newline character in the
| ExposeHeader tag in the CORS configuration file generates a header
| injection in the response when the CORS request is made. Ceph versions
| 3.x and 4.x are vulnerable to this issue.

The fix schould be included in 14.2.10 as well upstream.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-10753
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1840744

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Nov 20 10:37:21 2020; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.