CVE-2020-1760 - log back

CVE-2020-1760 edited at 23 Nov 2020 23:31:56
References
+ https://docs.ceph.com/en/latest/releases/octopus/#v15-2-1-octopus
https://docs.ceph.com/en/latest/releases/nautilus/#v14-2-9-nautilus
https://www.openwall.com/lists/oss-security/2020/04/07/1
https://github.com/ceph/ceph/pull/34482
https://github.com/ceph/ceph/commit/fce0b267446d6f3f631bb4680ebc3527bbbea002
https://github.com/ceph/ceph/commit/87a63d1743ec6428b43cc5a5977fa5e90f50b7ed
https://github.com/ceph/ceph/commit/c7da604cb101cbe78a257a29498a98c69964e0a6
CVE-2020-1760 edited at 22 Nov 2020 18:32:09
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Cross-site scripting
Description
+ A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input. If the attacker knows the path to a publicly readable object on any RGW cluster and the object is at least large enough to cover the attack body then it is possible to run an XSS on any object.
References
+ https://docs.ceph.com/en/latest/releases/nautilus/#v14-2-9-nautilus
+ https://www.openwall.com/lists/oss-security/2020/04/07/1
+ https://github.com/ceph/ceph/pull/34482
+ https://github.com/ceph/ceph/commit/fce0b267446d6f3f631bb4680ebc3527bbbea002
+ https://github.com/ceph/ceph/commit/87a63d1743ec6428b43cc5a5977fa5e90f50b7ed
+ https://github.com/ceph/ceph/commit/c7da604cb101cbe78a257a29498a98c69964e0a6
CVE-2020-1760 created at 22 Nov 2020 18:17:21
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes