CVE-2021-3509

Published: 27 May 2021

A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.

From the Ubuntu security team

Sergey Bobrov discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access.

Priority

Medium

CVSS 3 base score: 6.1

Status

Package Release Status
ceph
Launchpad, Ubuntu, Debian
Upstream
Released (15.2.12)
Ubuntu 21.04 (Hirsute Hippo) Needed

Ubuntu 20.10 (Groovy Gorilla)
Released (15.2.12-0ubuntu0.20.10.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (15.2.12-0ubuntu0.20.04.1)
Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

Patches:
Upstream: https://github.com/ceph/ceph/commit/adda853e64bdba1288d46bc7d462d23d8f2f10ca (nautilus)
Upstream: https://github.com/ceph/ceph/commit/7a1ca8d372da3b6a4fc3d221a0e5f72d1d61c27b (octopus)
Upstream: https://github.com/ceph/ceph/commit/af3fffab3b0f13057134d96e5d481e400d8bfd27 (pacific)

Notes

AuthorNote
mdeslaur
this is fixed in 16.2.4 in hirsute-proposed but has not been
pushed to the security pocket
sbeattie
incomplete fix for CVE-2020-27839.

References