View | Details | Raw Unified | Return to bug 248673 | Differences between
and this patch

Collapse All | Expand All

(-)security/vuxml/vuln.xml (+31 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="f20eb9a4-dfea-11ea-a9b8-9c5c8e84d621">
62
    <topic>ceph14 -- HTTP header injection via CORS ExposeHeader tag</topic>
63
    <affects>
64
      <package>
65
	<name>ceph14</name>
66
	<range><lt>14.2.11</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Red Hat bugzilla reports:</p>
72
	<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10753">
73
	  <p>A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway).
74
		The vulnerability is related to the injection of HTTP headers via a CORS
75
		ExposeHeader tag. The newline character in the ExposeHeader tag in the
76
		CORS configuration file generates a header injection in the response
77
		when the CORS request is made.</p>
78
	</blockquote>
79
      </body>
80
    </description>
81
    <references>
82
      <url>https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10753</url>
83
      <cvename>CVE-2020-10753</cvename>
84
      <freebsdpr>ports/248673</freebsdpr>
85
    </references>
86
    <dates>
87
      <discovery>2020-05-27</discovery>
88
      <entry>2020-08-16</entry>
89
    </dates>
90
  </vuln>
91
61
  <vuln vid="b8ea5b66-deff-11ea-adef-641c67a117d8">
92
  <vuln vid="b8ea5b66-deff-11ea-adef-641c67a117d8">
62
    <topic>snmptt -- malicious shell code</topic>
93
    <topic>snmptt -- malicious shell code</topic>
63
    <affects>
94
    <affects>

Return to bug 248673