René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

92 lines
2.8 KiB
JSON

{
"id": "CVE-2015-5245",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-12-03T20:59:05.223",
"lastModified": "2023-02-13T00:52:27.457",
"vulnStatus": "Modified",
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/113.html\">CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')</a>",
"descriptions": [
{
"lang": "en",
"value": "CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n CRLF en la Ceph Object Gateway (tambi\u00e9n conocida como radosgw o RGW) en Ceph en versiones anteriores a 0.94.4 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y llevar a cabo ataques de separaci\u00f3n de respuesta HTTP a trav\u00e9s de un nombre de contenedor manipulado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.94.3",
"matchCriteriaId": "484C877F-D9BB-4D8B-B8A9-2052E65ECE67"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tracker.ceph.com/issues/12537",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2015:2512",
"source": "secalert@redhat.com"
}
]
}