CVE-2020-27839
Published: 26 May 2021
A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser’s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
From the Ubuntu Security Team
It was discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access.
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(12.2.13-0ubuntu0.18.04.8)
|
focal |
Released
(15.2.12-0ubuntu0.20.04.1)
|
|
groovy |
Released
(15.2.12-0ubuntu0.20.10.1)
|
|
hirsute |
Released
(16.1.0-0ubuntu2)
|
|
impish |
Released
(16.1.0-0ubuntu2)
|
|
jammy |
Released
(16.1.0-0ubuntu2)
|
|
trusty |
Not vulnerable
|
|
upstream |
Released
(16.1.0,15.2.9)
|
|
xenial |
Not vulnerable
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/23f2604d6f9ac16779b4ac43aab6e4e434f2e8ec upstream: https://github.com/ceph/ceph/commit/e5501a34ee8237dfe64104c612c812b16121db6d (octopus) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.4 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |