DSA-2024-331: Security Update for Dell ECS Host Header Injection Vulnerability

Resumen: Dell ECS remediation is available for a Host Header Injection vulnerability that could be exploited by malicious users to compromise the affected system.

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Impacto

Medium

Detalles adicionales

Only Management API calls through a proxy or a load balancer are impacted. Data operations and Management API calls made directly to the ECS nodes are not impacted.

Detalles

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2024-38485 Dell ECS, versions prior to 3.8.0, contain(s) a Host Header Injection Vulnerability. A remote low-privileged attacker could potentially exploit this vulnerability to trigger redirections that leads to sensitive information leakage. 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2024-38485 Dell ECS, versions prior to 3.8.0, contain(s) a Host Header Injection Vulnerability. A remote low-privileged attacker could potentially exploit this vulnerability to trigger redirections that leads to sensitive information leakage. 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies recomienda que todos los clientes tengan en cuenta tanto la puntuación base como cualquier otra puntuación ambiental y temporal relevante que pueda afectar la posible gravedad asociada con la vulnerabilidad de seguridad en particular.

Corrección y productos afectados

Product Affected Versions Remediated Versions Link
ECS Versions prior to 3.8.0 Versions 3.8.0 or later Click here to open an “Operating Environment Upgrade” Service Request
Product Affected Versions Remediated Versions Link
ECS Versions prior to 3.8.0 Versions 3.8.0 or later Click here to open an “Operating Environment Upgrade” Service Request
Note:
  • For more information on preventing Host Header Injection with Management API usage, please refer to the “Security fix for Management API” section in the ECS 3.8.1 Administration Guide.
  • Only Management API calls through a proxy or a load balancer are impacted.
    • Data operations are not impacted.
    • Management API calls made directly to the ECS nodes are not impacted.
  • Please refer to KB Article: 000205031 for use cases to implement the solution.

Historial de revisiones

Revision

Date

Description

1.0

2024-12-03

Initial Release

Información relacionada

Productos afectados

ECS, ECS Appliance, ECS Appliance Software with Encryption, ECS Appliance Software without Encryption
Propiedades del artículo
Número del artículo: 000256185
Tipo de artículo: Dell Security Advisory
Última modificación: 03 dic 2024
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.