Your submission was sent successfully! Close

CVE-2021-3509

Published: 27 May 2021

A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.

From the Ubuntu security team

Sergey Bobrov discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access.

Priority

Medium

CVSS 3 base score: 6.1

Status

Package Release Status
ceph
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(12.2.13-0ubuntu0.18.04.8)
focal
Released (15.2.12-0ubuntu0.20.04.1)
groovy
Released (15.2.12-0ubuntu0.20.10.1)
hirsute
Released (16.2.6-0ubuntu0.21.04.2)
impish
Released (16.2.4-0ubuntu1)
jammy
Released (16.2.4-0ubuntu1)
precise Ignored
(end of ESM support, was needs-triage)
trusty Not vulnerable

upstream
Released (15.2.12)
xenial Not vulnerable

Notes

AuthorNote
mdeslaur
this is fixed in 16.2.4 in hirsute-updates but has not been
pushed to the security pocket
sbeattie
incomplete fix for CVE-2020-27839.

References

Bugs