CVE-2016-9579

A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request. Ceph branches 1.3.x and 2.x are affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*
OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2954.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2954.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2956.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2956.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2994.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2994.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2995.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2995.html - Third Party Advisory
References () http://tracker.ceph.com/issues/18187 - Exploit, Patch, Vendor Advisory () http://tracker.ceph.com/issues/18187 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/94936 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94936 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9579 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9579 - Exploit, Issue Tracking, Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 6.5

Information

Published : 2018-08-01 16:29

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9579

Mitre link : CVE-2016-9579

CVE.ORG link : CVE-2016-9579


JSON object : View

Products Affected

redhat

  • ceph_storage_osd
  • ceph_storage
  • enterprise_linux_workstation
  • enterprise_linux_server
  • ceph_storage_mon
  • enterprise_linux_desktop
  • enterprise_linux

canonical

  • ubuntu_linux
CWE
CWE-20

Improper Input Validation