### [CVE-2021-3524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524) ![](https://img.shields.io/static/v1?label=Product&message=ceph&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=ceph%2014.2.21%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20&color=brightgreen) ### Description A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2021-3524