A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1760 | Issue Tracking Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html | Mailing List Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html | |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/ | |
| https://security.gentoo.org/glsa/202105-39 | Third Party Advisory | 
| https://usn.ubuntu.com/4528-1/ | Third Party Advisory | 
| https://www.openwall.com/lists/oss-security/2020/04/07/1 | Mailing List Patch Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2020-04-23 15:15
Updated : 2023-11-07 03:19
NVD link : CVE-2020-1760
Mitre link : CVE-2020-1760
CVE.ORG link : CVE-2020-1760
JSON object : View
Products Affected
                canonical
- ubuntu_linux
fedoraproject
- fedora
debian
- debian_linux
redhat
- openshift_container_platform
- ceph_storage
linuxfoundation
- ceph
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
