CVE-2015-5245

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-5245
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-5245.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2015-5245
Related
Published
2015-12-03T20:59:05Z
Modified
2024-11-21T02:32:38Z
Downstream
Summary
[none]
Details

CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name.

References

Affected packages

Debian:11 / ceph

Package

Name
ceph
Purl
pkg:deb/debian/ceph?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.80.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ceph

Package

Name
ceph
Purl
pkg:deb/debian/ceph?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.80.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ceph

Package

Name
ceph
Purl
pkg:deb/debian/ceph?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.80.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}