First published: Tue Oct 27 2020(Updated: )
A flaw was found in ceph in versions prior to 16.y.z where ceph stores mgr module passwords in clear text. This can be found by searching the mgr logs for grafana and dashboard, with passwords visible.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ceph | <2:14.2.11-147.el7c | 2:14.2.11-147.el7c |
redhat/ceph-ansible | <0:4.0.49.2-1.el8c | 0:4.0.49.2-1.el8c |
redhat/gperftools | <0:2.6.3-3.el8c | 0:2.6.3-3.el8c |
redhat/tcmu-runner | <0:1.5.2-2.el7c | 0:1.5.2-2.el7c |
Redhat Ceph | <16.2.0 | |
Redhat Ceph Storage | =4.0 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in Ceph is CVE-2020-25678.
The highest threat from this vulnerability is to confidentiality.
You can identify if your Ceph installation is affected by searching the mgr logs for Grafana and dashboard, with passwords visible.
The severity level of CVE-2020-25678 is medium.
You can find more information about CVE-2020-25678 at the following references: [link 1](https://tracker.ceph.com/issues/37503), [link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1900681), [link 3](https://access.redhat.com/errata/RHSA-2021:1452).