Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat ceph storage 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-3854
A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
Redhat Ceph Storage 3.0
Redhat Ceph Storage 4.0
Redhat Ceph Storage 5.0
2.1
CVSSv2
CVE-2020-25677
A flaw was found in Ceph-ansible v4.0.41 where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.
Ceph Ceph-ansible 4.0.41
Redhat Ceph Storage 3.0
Redhat Ceph Storage 4.0
7.5
CVSSv2
CVE-2022-26148
An issue exists in Grafana up to and including 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search...
Grafana Grafana
Redhat Ceph Storage 3.0
Redhat Storage 3.0
Redhat Ceph Storage 4.0
Redhat Ceph Storage 5.0
3.6
CVSSv2
CVE-2020-27781
User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved vi...
Redhat Ceph
Redhat Ceph Storage 3.0
Redhat Ceph Storage 2.0
Redhat Openshift Container Platform 4.0
Redhat Ceph Storage 4.0
Redhat Openstack Platform 13.0
Fedoraproject Fedora 33
5.8
CVSSv2
CVE-2020-25660
A flaw was found in the Cephx authentication protocol in versions prior to 15.2.6 and prior to 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to au...
Redhat Ceph
Redhat Ceph Storage 2.0
Redhat Openshift Container Platform 4.0
Redhat Ceph Storage 4.0
Fedoraproject Fedora 33
NA
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks...
Redhat Ceph Storage 3.0
Redhat Openstack Platform 13.0
Redhat Openshift Container Storage 4.0
Redhat Openshift Data Foundation 4.0
Redhat Ceph Storage For Ibm Z Systems 4.0
Redhat Ceph Storage 4.3
Redhat Ceph Storage 5.1
Redhat Ceph Storage 4.0
Redhat Ceph Storage 5.0
Redhat Ceph Storage For Power 4.0
Fedoraproject Fedora 35
Fedoraproject Fedora 37
6.4
CVSSv2
CVE-2021-4048
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possib...
Lapack Project Lapack
Openblas Project Openblas
Julialang Julia 1.7.0
Julialang Julia
Redhat Ceph Storage 3.0
Redhat Ceph Storage 2.0
Redhat Enterprise Linux 8.0
Redhat Ceph Storage 4.0
Redhat Ceph Storage 5.0
Redhat Openshift Container Storage 4.0
Redhat Openshift Data Foundation 4.0
Fedoraproject Fedora 34
Fedoraproject Fedora 35
2.1
CVSSv2
CVE-2020-25678
A flaw was found in ceph in versions before 16.y.z where ceph stores mgr module passwords in clear text. This can be found by searching the mgr logs for grafana and dashboard, with passwords visible.
Redhat Ceph Storage 4.0
Redhat Ceph
Fedoraproject Fedora 33
4.3
CVSSv2
CVE-2021-3509
A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it ava...
Redhat Ceph Storage 4.0
5
CVSSv2
CVE-2020-1699
A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine r...
Linuxfoundation Ceph 14.2.5
Linuxfoundation Ceph 14.2.6
Linuxfoundation Ceph 15.0.0
Redhat Ceph Storage 4.0
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »