NA

CVE-2023-43040

Vulnerability Summary

A flaw was found in rgw. This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST's form-data contains a key called 'bucket' with a value matching the bucket's name used to sign the request. This issue results in a user being able to upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in the said POST form part. (CVE-2023-43040)

Vulnerability Trend

Vendor Advisories

Debian Bug report logs - #1053690 ceph: CVE-2023-43040: Improperly verified POST keys Package: src:ceph; Maintainer for src:ceph is Ceph Packaging Team <team+ceph@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 8 Oct 2023 20:03:02 UTC Severity: important Tags: security, upstream ...
Synopsis Moderate: Red Hat Ceph Storage 53 Security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update is now available for Red Hat Ceph Storage 53 in the Red HatEcosystem CatalogRed Hat Product Security h ...
Synopsis Moderate: Red Hat Ceph Storage 61 security, enhancement, and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update is now available for Red Hat Ceph Storage 61 in the Red HatEcosystem Catalog ...
A flaw was found in rgw This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST's form-data contains a key called 'bucket' with a value matching the bucket's name used to sign the request This issue results in a user being able to upload to any bucket accessible by the specified access key as long as th ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...