cve/2021/CVE-2021-3524.md
2025-09-29 21:09:30 +02:00

18 lines
964 B
Markdown

### [CVE-2021-3524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524)
![](https://img.shields.io/static/v1?label=Product&message=ceph&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=ceph%2014.2.21%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20&color=brightgreen)
### Description
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2021-3524