Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20288

Опубликовано: 14 апр. 2021
Источник: redhat
CVSS3: 8
EPSS Низкий

Описание

An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

An authentication flaw was found in ceph. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

  • Red Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of ceph package is no longer used and supported with the release of RHOCS 4.3.
  • Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP ceph package will not be updated at this time.
  • The ceph packages included in Red Hat Enterprise Linux only provide client side libraries and tools and therefore are not affected by this issue affecting ceph-mon service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2cephOut of support scope
Red Hat Enterprise Linux 7ceph-commonNot affected
Red Hat Enterprise Linux 8cephNot affected
Red Hat Enterprise Linux 9cephNot affected
Red Hat Openshift Container Storage 4cephWill not fix
Red Hat OpenStack Platform 13 (Queens)cephWill not fix
Red Hat Ceph Storage 3 - ELScephFixedRHSA-2022:139419.04.2022
Red Hat Ceph Storage 4.2cephFixedRHSA-2021:244515.06.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1938031ceph: Unauthorized global_id reuse in cephx

EPSS

Процентиль: 40%
0.00179
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
почти 5 лет назад

An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.2
nvd
почти 5 лет назад

An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.2
debian
почти 5 лет назад

An authentication flaw was found in ceph in versions before 14.2.20. W ...

suse-cvrf
почти 5 лет назад

Security update for ceph

suse-cvrf
почти 5 лет назад

Security update for ceph

EPSS

Процентиль: 40%
0.00179
Низкий

8 High

CVSS3

Уязвимость CVE-2021-20288