CVE-2020-10753

NameCVE-2020-10753
DescriptionA flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2735-1, DLA-3629-1, ELA-471-1
Debian Bugs975300

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ceph (PTS)jessie, jessie (lts)0.80.7-2+deb8u6fixed
stretch (security)10.2.11-2+deb9u1fixed
stretch (lts), stretch10.2.11-2+deb9u2fixed
buster (security), buster, buster (lts)12.2.11+dfsg1-2.1+deb10u1fixed
bullseye14.2.21-1fixed
bookworm16.2.11+ds-2fixed
bookworm (security)16.2.15+ds-0+deb12u1fixed
sid, trixie18.2.4+ds-11fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cephsourcejessie0.80.7-2+deb8u5ELA-471-1
cephsourcestretch10.2.11-2+deb9u1DLA-2735-1
cephsourcebuster12.2.11+dfsg1-2.1+deb10u1DLA-3629-1
cephsource(unstable)14.2.15-1975300

Notes

[jessie] - ceph <no-dsa> (Minor issue)
https://github.com/ceph/ceph/pull/35773
Fix: https://github.com/ceph/ceph/commit/1524d3c0c5cb11775313ea1e2bb36a93257947f2

Search for package or bug name: Reporting problems