CVE-2016-9579

Severity
7.5HIGH
EPSS
18.0%
top 4.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateMay 13

Description

A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request. Ceph branches 1.3.x and 2.x are affected.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages8 packages

Debianceph< 10.2.5-2+3
CVEListV5red_hat/ceph1.3 and 2
NVDredhat/ceph_storage1.3, 2.0+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2594-xrq4-4jm3: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket2022-05-13
OSV
CVE-2016-9579: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket2018-08-01
CVEList
CVE-2016-9579: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket2018-08-01

📋Vendor Advisories

3
Ubuntu
Ceph vulnerabilities2017-10-11
Red Hat
ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request2016-12-08
Debian
CVE-2016-9579: ceph - A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP ...2016

💬Community

3
Bugzilla
CVE-2016-9579 ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request2016-12-09
Bugzilla
CVE-2016-9579 ceph: RGW server DoS via request with invalid HTTP Origin header [fedora-all]2016-12-09
Bugzilla
CVE-2016-9579 ceph: RGW server DoS via request with invalid HTTP Origin header [epel-all]2016-12-09