A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2735-1 ceph security update
Debian DLA Debian DLA DLA-3629-1 ceph security update
EUVD EUVD EUVD-2021-26840 A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
Ubuntu USN Ubuntu USN USN-4998-1 Ceph vulnerabilities
Ubuntu USN Ubuntu USN USN-5128-1 Ceph vulnerabilities
Ubuntu USN Ubuntu USN USN-7706-1 Ceph vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:01:06.034Z

Reserved: 2021-04-30T00:00:00

Link: CVE-2021-3524

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-17T17:15:08.773

Modified: 2024-11-21T06:21:45.760

Link: CVE-2021-3524

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-04-15T00:00:00Z

Links: CVE-2021-3524 - Bugzilla

cve-icon OpenCVE Enrichment

No data.