CVE-2020-10753

Source
https://cve.org/CVERecord?id=CVE-2020-10753
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10753.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-10753
Aliases
Downstream
Related
Published
2020-06-26T15:15:11.573Z
Modified
2026-05-18T05:50:50.560025189Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.

Database specific
{
    "unresolved_ranges": [
        {
            "cpes": [
                "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "16.04"
                },
                {
                    "last_affected": "18.04"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "canonical:ubuntu_linux"
        },
        {
            "cpes": [
                "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "32"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fedoraproject:fedora"
        },
        {
            "cpes": [
                "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "15.1"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "opensuse:leap"
        },
        {
            "cpes": [
                "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "3.0"
                },
                {
                    "last_affected": "4.0"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "redhat:ceph_storage"
        },
        {
            "cpes": [
                "cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "15"
                }
            ],
            "source": "CPE_FIELD",
            "vendor_product": "redhat:openstack"
        }
    ]
}
References

Affected packages

Git / github.com/ceph/ceph

Affected ranges

Type
GIT
Repo
https://github.com/ceph/ceph
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "14.2.21"
        }
    ],
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*"
}

Affected versions

v0.*
v0.1
v0.18
v0.19
v0.2
v0.4
v0.5
v0.6
v0.7.1
v0.7.2
v0.7.3
v0.9
v11.*
v11.0.0
v13.*
v13.0.0
v14.*
v14.0.0
v14.2.0
v14.2.1
v14.2.10
v14.2.11
v14.2.12
v14.2.13
v14.2.14
v14.2.15
v14.2.16
v14.2.17
v14.2.18
v14.2.19
v14.2.2
v14.2.20
v14.2.3
v14.2.5
v14.2.6
v14.2.7
v14.2.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10753.json"