DSA-2024-331: Security Update for Dell ECS Host Header Injection Vulnerability

Zusammenfassung: Dell ECS remediation is available for a Host Header Injection vulnerability that could be exploited by malicious users to compromise the affected system.

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Auswirkungen

Medium

Weitere Angaben

Only Management API calls through a proxy or a load balancer are impacted. Data operations and Management API calls made directly to the ECS nodes are not impacted.

Details

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2024-38485 Dell ECS, versions prior to 3.8.0, contain(s) a Host Header Injection Vulnerability. A remote low-privileged attacker could potentially exploit this vulnerability to trigger redirections that leads to sensitive information leakage. 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2024-38485 Dell ECS, versions prior to 3.8.0, contain(s) a Host Header Injection Vulnerability. A remote low-privileged attacker could potentially exploit this vulnerability to trigger redirections that leads to sensitive information leakage. 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product Affected Versions Remediated Versions Link
ECS Versions prior to 3.8.0 Versions 3.8.0 or later Click here to open an “Operating Environment Upgrade” Service Request
Product Affected Versions Remediated Versions Link
ECS Versions prior to 3.8.0 Versions 3.8.0 or later Click here to open an “Operating Environment Upgrade” Service Request
Note:
  • For more information on preventing Host Header Injection with Management API usage, please refer to the “Security fix for Management API” section in the ECS 3.8.1 Administration Guide.
  • Only Management API calls through a proxy or a load balancer are impacted.
    • Data operations are not impacted.
    • Management API calls made directly to the ECS nodes are not impacted.
  • Please refer to KB Article: 000205031 for use cases to implement the solution.

Revisionsverlauf

Revision

Date

Description

1.0

2024-12-03

Initial Release

Zugehörige Informationen

Betroffene Produkte

ECS, ECS Appliance, ECS Appliance Software with Encryption, ECS Appliance Software without Encryption
Artikeleigenschaften
Artikelnummer: 000256185
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 03 Dez. 2024
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.