CVE-2020-1760 – ceph: header-splitting in RGW GetObject has a possible XSS
https://notcve.org/view.php?id=CVE-2020-1760
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input. Se encontró un fallo en Ceph Object Gateway, donde admite peticiones enviadas por un usuario anónimo en Amazon S3. Este fallo podría conllevar a posibles ataques de tipo XSS debido a una falta de neutralización apropiada de una entrada no segura. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1760 https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE https://security.gentoo.org/glsa/202105-39 https://usn.ubuntu.com/4528-1 https://www.openwall.com/lists/oss-security/2020/04/07/1 https://access.redhat.com/security/cve/ • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-19337 – ceph: denial of service in RGW daemon
https://notcve.org/view.php?id=CVE-2019-19337
A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server. Se encontró un fallo en Red Hat Ceph Storage versión 3 en la manera en que el demonio Ceph RADOS Gateway maneja las peticiones S3. Un atacante autenticado puede abusar de este fallo causando una denegación de servicio remota mediante el envío de un encabezado HTTP Content-Length especialmente diseñado para el servidor Ceph RADOS Gateway. A flaw was found in the way the Ceph RADOS Gateway daemon handles S3 requests. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19337 https://access.redhat.com/security/cve/CVE-2019-19337 https://bugzilla.redhat.com/show_bug.cgi?id=1781170 • CWE-20: Improper Input Validation •
CVE-2019-10222 – ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend
https://notcve.org/view.php?id=CVE-2019-10222
A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients. Se detectó un fallo en la configuración de Ceph RGW con Beast como el front-end que maneja las peticiones de clientes. Un atacante no autenticado podría bloquear el servidor Ceph RGW mediante el envío de encabezados HTTP válidos y finalizando la conexión, resultando en una denegación de servicio remota para los clientes de Ceph RGW. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222 https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html https://tracker.ceph.com/issues/40018 https://access.redhat.com/security/cve/CVE-2019-10222 https://bugzilla.redhat.com/show_bug.cgi?id=1739292 • CWE-755: Improper Handling of Exceptional Conditions •