Skip to content

A flaw was found in the Ceph RGW configuration with Beast...

Moderate severity Unreviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Nov 1, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

References

Published by the National Vulnerability Database Nov 8, 2019
Published to the GitHub Advisory Database May 24, 2022
Last updated Nov 1, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(88th percentile)

Weaknesses

Improper Handling of Exceptional Conditions

The product does not handle or incorrectly handles an exceptional condition. Learn more on MITRE.

CVE ID

CVE-2019-10222

GHSA ID

GHSA-vr4v-h7xq-hwc6

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.