Ceph Object Gateway HTTP Response Splitting Vulnerability


Description   (:A vulnerability was reported in Ceph.:A remote attacker could exploit it via a specially crafted bucket name in order to inject HTTP headers and perform HTTP splitting attacks.::This vulnerability is due to Ceph which returns requested bucket name raw in Bucket response header.)
     
Vulnerable Products   Vulnerable OS:
GNU/Linux (Debian) - 8
     
Solution   Version 8.3 of Debian Jessie fixes this vulnerability.
     
CVE   CVE-2015-5245
     
References   - Ceph : v0.94.4 Hammer released
http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html
- Debian : Updated Debian 8: 8.3 released
https://www.debian.org/News/2016/20160123
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
HTTP Response Splitting : suspicious Content-Length in URL
3.2.0
HTTP Response Splitting : suspicious HTTP/1.x in URL
3.2.0
HTTP Response Splitting : suspicious Set-Cookie in URL
3.2.0
HTTP Response Splitting : suspicious Content-Type in URL
3.5.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2015-10-19 

 Target Type 
Server 

 Possible exploit 
Remote