Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-48916

Опубликовано: 02 дек. 2024
Источник: redhat
CVSS3: 9.1

Описание

Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.

A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider allows attackers to bypass JWT signature verification by supplying a token with "none" as the algorithm (alg). This occurs because the implementation fails to enforce strict signature validation, enabling attackers to forge valid tokens without a signature.

Отчет

This vulnerability is rated Important due to its ability to bypass JWT signature verification in Ceph Rados Gateway, allowing attackers to forge tokens and gain unauthorized access. OpenShift Data Foundation (ODF) is affected but not vulnerable to this issue. To exploit this issue, an attacker needs to use OIDC and manually set the algorithm to "none", then RadosGW will not validate the signature on a JWT. ODF is protected because it uses the Vault API to interface with OIDC (and other providers) and it does not support "none" as an algorithm type.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 4cephAffected
Red Hat Ceph Storage 4rhceph/rhceph-4-rhel8Affected
Red Hat Ceph Storage 5cephAffected
Red Hat Ceph Storage 5rhceph/rhceph-5-rhel8Affected
Red Hat Ceph Storage 6rhceph/rhceph-6-rhel9Affected
Red Hat Ceph Storage 7rhceph/rhceph-7-rhel9Affected
Red Hat Enterprise Linux 8cephNot affected
Red Hat Enterprise Linux 9cephNot affected
Red Hat Openshift Data Foundation 4odf4/cephcsi-rhel9Not affected
Red Hat Ceph Storage 6.1cephFixedRHSA-2025:423828.04.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-345
https://bugzilla.redhat.com/show_bug.cgi?id=2329846ceph: rhceph-container: Authentication bypass in CEPH RadosGW

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
6 месяцев назад

Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.

CVSS3: 8.1
nvd
6 месяцев назад

Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.

CVSS3: 8.1
msrc
5 месяцев назад

Ceph is vulnerable to authentication bypass through RadosGW

CVSS3: 8.1
debian
6 месяцев назад

Ceph is a distributed object, block, and file storage platform. In ver ...

CVSS3: 8.1
fstec
около 1 года назад

Уязвимость демона radosgw системы хранения данных Ceph, позволяющая нарушителю обойти процедуру аутентификации

9.1 Critical

CVSS3