MEDIUM · 5.4

CVE-2020-10753

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the Expo...

Vulnerability Description

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.

CVSS Score

5.4

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
RedhatCeph Storage3.0
RedhatOpenstack15
FedoraprojectFedora32
OpensuseLeap15.1
LinuxfoundationCeph< 14.2.21
CanonicalUbuntu Linux16.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-10753?

CVE-2020-10753 is a vulnerability with a CVSS score of 5.4 (MEDIUM). A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the Expo...

How severe is CVE-2020-10753?

CVE-2020-10753 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-10753?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ceph Storage, Redhat Openstack, Fedoraproject Fedora, Opensuse Leap, Linuxfoundation Ceph.