First published: Mon Oct 03 2016(Updated: )
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph | <=10.0.0 | |
Red Hat Ceph Storage | <=1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7031 has a moderate severity level as it allows authenticated users to list the contents of a bucket due to a misconfiguration in the ACL settings.
To fix CVE-2016-7031, upgrade Ceph to version 10.0.1 or later, or properly configure the access control lists to prevent unauthorized access.
CVE-2016-7031 affects Ceph versions prior to 10.0.1 and Red Hat Ceph Storage versions up to 1.3.2.
Yes, CVE-2016-7031 can be exploited remotely by attackers who have authenticated access to the affected bucket.
The impact of CVE-2016-7031 may result in unauthorized users being able to list sensitive data stored in your Ceph buckets.