Lucene search

K
ibmIBM75A7BCB7305A881A67BE92D0C416745E88FB2BC4AC0109FE3DF01821028A3140
HistoryJan 25, 2024 - 2:00 p.m.

Security Bulletin: IBM Storage Ceph is vulnerable to a HTTP Request Smuggling vulnerablity in Golang (CVE-2022-1705)

2024-01-2514:00:14
www.ibm.com
3
ibm storage ceph
http request smuggling
golang
rgw
upgrade
cve-2022-1705
vulnerability

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.1%

Summary

Golang is used by IBM Storage Ceph as part of RGW and in assorted other locations. CVE-2022-1705

Vulnerability Details

CVEID:CVE-2022-1705
**DESCRIPTION:**Golang Go is vulnerable to HTTP request smuggling, caused by a flaw with accepting of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/233258 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Update Affected Products list to remove “Ceph - All” because the VIT was closed with Result Invalid reason

Affected Product(s) Version(s)
IBM Storage Ceph <6.1
IBM Storage Ceph 5.3z1-z5

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.
Download the latest version of Ceph and upgrade to 6.1 by following instructions.

<https://public.dhe.ibm.com/ibmdl/export/pub/storage/ceph/&gt;
<https://www.ibm.com/docs/en/storage-ceph/6?topic=upgrading&gt;

Workarounds and Mitigations

None

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.1%