CVE-2016-7031
Published: 3 October 2016
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
Notes
Author | Note |
---|---|
tyhicks | Fix present in 11.0.0, 10.1.0, and 10.0.1 Rados gateway code in Ubuntu 12.04 is significantly different. At this time, I'm not sure if it affected. |
leosilva | code affected is not present in precise |
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(10.2.2-0ubuntu5)
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(0.80.11-0ubuntu1.14.04.3)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(10.2.2-0ubuntu0.16.04.2)
|
|
yakkety |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
zesty |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/97bf0bcf02917fd772fbef73bb68e155feb84c1b upstream: https://github.com/ceph/ceph/commit/9ad73698f57598ae1302aaf175cb96082eb64961 upstream: https://github.com/ceph/ceph/pull/6057 upstream: https://github.com/ceph/ceph/pull/11045 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |