Total vulnerabilities in the database
A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request. Ceph branches 1.3.x and 2.x are affected.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / ceph_storage_osd | 1.3 | 1.3.x |
redhat / ceph_storage_mon | 1.3 | 1.3.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / ceph_storage_osd | 2 | 2.x |
redhat / ceph_storage_mon | 2 | 2.x |
redhat / ceph_storage | 1.3 | 1.3.x |
redhat / ceph_storage | 2.0 | 2.0.x |