CVE-2021-3509
Published: 27 May 2021
A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.
From the Ubuntu Security Team
Sergey Bobrov discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access.
Notes
Author | Note |
---|---|
mdeslaur | this is fixed in 16.2.4 in hirsute-updates but has not been pushed to the security pocket |
sbeattie | incomplete fix for CVE-2020-27839. |
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(12.2.13-0ubuntu0.18.04.8)
|
focal |
Released
(15.2.12-0ubuntu0.20.04.1)
|
|
groovy |
Released
(15.2.12-0ubuntu0.20.10.1)
|
|
hirsute |
Released
(16.2.6-0ubuntu0.21.04.2)
|
|
impish |
Released
(16.2.4-0ubuntu1)
|
|
jammy |
Released
(16.2.4-0ubuntu1)
|
|
trusty |
Not vulnerable
|
|
upstream |
Released
(15.2.12)
|
|
xenial |
Not vulnerable
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/adda853e64bdba1288d46bc7d462d23d8f2f10ca upstream: https://github.com/ceph/ceph/commit/7a1ca8d372da3b6a4fc3d221a0e5f72d1d61c27b upstream: https://github.com/ceph/ceph/commit/af3fffab3b0f13057134d96e5d481e400d8bfd27 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |