CVE-2021-3509
Published: 27 May 2021
A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.
From the Ubuntu Security Team
Sergey Bobrov discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access.
Notes
Author | Note |
---|---|
mdeslaur | this is fixed in 16.2.4 in hirsute-updates but has not been pushed to the security pocket |
sbeattie | incomplete fix for CVE-2020-27839. |
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
hirsute |
Released
(16.2.6-0ubuntu0.21.04.2)
|
impish |
Released
(16.2.4-0ubuntu1)
|
|
jammy |
Released
(16.2.4-0ubuntu1)
|
|
bionic |
Not vulnerable
(12.2.13-0ubuntu0.18.04.8)
|
|
trusty |
Not vulnerable
|
|
upstream |
Released
(15.2.12)
|
|
xenial |
Not vulnerable
|
|
focal |
Released
(15.2.12-0ubuntu0.20.04.1)
|
|
groovy |
Released
(15.2.12-0ubuntu0.20.10.1)
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/adda853e64bdba1288d46bc7d462d23d8f2f10ca (nautilus) upstream: https://github.com/ceph/ceph/commit/7a1ca8d372da3b6a4fc3d221a0e5f72d1d61c27b (octopus) upstream: https://github.com/ceph/ceph/commit/af3fffab3b0f13057134d96e5d481e400d8bfd27 (pacific) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |