CVE-2021-3524

NameCVE-2021-3524
DescriptionA flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2735-1
NVD severitymedium
Debian Bugs988889

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ceph (PTS)stretch10.2.11-2vulnerable
stretch (security)10.2.11-2+deb9u1fixed
buster12.2.11+dfsg1-2.1vulnerable
bullseye14.2.21-1fixed
bookworm, sid14.2.21-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cephsourcestretch10.2.11-2+deb9u1DLA-2735-1
cephsource(unstable)14.2.21-1988889

Notes

[buster] - ceph <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=1951674
Fixed by: https://github.com/ceph/ceph/commit/763aebb94678018f89427137ffbc0c5205b1edc1

Search for package or bug name: Reporting problems