Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linuxfoundation ceph vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2020-1699
A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine r...
Linuxfoundation Ceph 14.2.5
Linuxfoundation Ceph 14.2.6
Linuxfoundation Ceph 15.0.0
Redhat Ceph Storage 4.0
1 Github repository
8
CVSSv3
CVE-2020-10736
An authorization bypass vulnerability was found in Ceph versions 15.2.0 prior to 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configur...
Linuxfoundation Ceph
9.1
CVSSv3
CVE-2022-0670
A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an malicious user to ...
Linuxfoundation Ceph
Redhat Ceph Storage
Fedoraproject Fedora 35
Fedoraproject Fedora 36
6.8
CVSSv3
CVE-2020-1759
A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability exists in the secure mode of the messenger v2 protocol, which can allow an malicious user to forge auth tags and potentially manipulate the data by l...
Redhat Openshift 4.2
Redhat Ceph Storage 4.0
Redhat Openstack 15
Linuxfoundation Ceph
Fedoraproject Fedora 31
7.2
CVSSv3
CVE-2021-20288
An authentication flaw was found in ceph in versions prior to 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a g...
Linuxfoundation Ceph
Redhat Ceph Storage 4.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2020-12059
An issue exists in Ceph up to and including 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception.
Linuxfoundation Ceph
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
6.5
CVSSv3
CVE-2020-10753
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the ...
Redhat Ceph Storage 3.0
Redhat Ceph Storage 4.0
Redhat Openstack 15
Fedoraproject Fedora 32
Opensuse Leap 15.1
Linuxfoundation Ceph
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
6.1
CVSSv3
CVE-2020-1760
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
Linuxfoundation Ceph
Redhat Ceph Storage 3.0
Redhat Openshift Container Platform 4.2
Redhat Ceph Storage 4.0
Fedoraproject Fedora 31
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started