openEuler update for ceph



| Updated: 2024-08-02
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-43040
CWE-ID CWE-285
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

python-rgw
Operating systems & Components / Operating system package or component

libradosstriper-devel
Operating systems & Components / Operating system package or component

ceph-test
Operating systems & Components / Operating system package or component

ceph-mgr
Operating systems & Components / Operating system package or component

librbd-devel
Operating systems & Components / Operating system package or component

python3-rados
Operating systems & Components / Operating system package or component

python-cephfs
Operating systems & Components / Operating system package or component

rados-objclass-devel
Operating systems & Components / Operating system package or component

ceph-mds
Operating systems & Components / Operating system package or component

librgw2
Operating systems & Components / Operating system package or component

python-rados
Operating systems & Components / Operating system package or component

libradosstriper1
Operating systems & Components / Operating system package or component

rbd-mirror
Operating systems & Components / Operating system package or component

ceph-radosgw
Operating systems & Components / Operating system package or component

librados-devel
Operating systems & Components / Operating system package or component

ceph-selinux
Operating systems & Components / Operating system package or component

python3-ceph-argparse
Operating systems & Components / Operating system package or component

ceph-debuginfo
Operating systems & Components / Operating system package or component

libcephfs-devel
Operating systems & Components / Operating system package or component

python-ceph-compat
Operating systems & Components / Operating system package or component

python3-rgw
Operating systems & Components / Operating system package or component

ceph-resource-agents
Operating systems & Components / Operating system package or component

ceph-mon
Operating systems & Components / Operating system package or component

librbd1
Operating systems & Components / Operating system package or component

librados2
Operating systems & Components / Operating system package or component

libcephfs2
Operating systems & Components / Operating system package or component

ceph-base
Operating systems & Components / Operating system package or component

librgw-devel
Operating systems & Components / Operating system package or component

ceph-osd
Operating systems & Components / Operating system package or component

ceph-debugsource
Operating systems & Components / Operating system package or component

ceph-common
Operating systems & Components / Operating system package or component

python3-rbd
Operating systems & Components / Operating system package or component

ceph-fuse
Operating systems & Components / Operating system package or component

rbd-fuse
Operating systems & Components / Operating system package or component

python3-cephfs
Operating systems & Components / Operating system package or component

python-rbd
Operating systems & Components / Operating system package or component

rbd-nbd
Operating systems & Components / Operating system package or component

ceph
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper Authorization

EUVDB-ID: #VU82112

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2023-43040

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: Yes

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to improper authorization in radogw API gateway in Ceph when processing POST requests. A remote unprivileged user can write to any bucket(s) accessible by a given key if a POST form-data contains a key called "bucket" with a value matching the bucket's name used to sign the request.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

python-rgw: before 12.2.8-23

libradosstriper-devel: before 12.2.8-23

ceph-test: before 12.2.8-23

ceph-mgr: before 12.2.8-23

librbd-devel: before 12.2.8-23

python3-rados: before 12.2.8-23

python-cephfs: before 12.2.8-23

rados-objclass-devel: before 12.2.8-23

ceph-mds: before 12.2.8-23

librgw2: before 12.2.8-23

python-rados: before 12.2.8-23

libradosstriper1: before 12.2.8-23

rbd-mirror: before 12.2.8-23

ceph-radosgw: before 12.2.8-23

librados-devel: before 12.2.8-23

ceph-selinux: before 12.2.8-23

python3-ceph-argparse: before 12.2.8-23

ceph-debuginfo: before 12.2.8-23

libcephfs-devel: before 12.2.8-23

python-ceph-compat: before 12.2.8-23

python3-rgw: before 12.2.8-23

ceph-resource-agents: before 12.2.8-23

ceph-mon: before 12.2.8-23

librbd1: before 12.2.8-23

librados2: before 12.2.8-23

libcephfs2: before 12.2.8-23

ceph-base: before 12.2.8-23

librgw-devel: before 12.2.8-23

ceph-osd: before 12.2.8-23

ceph-debugsource: before 12.2.8-23

ceph-common: before 12.2.8-23

python3-rbd: before 12.2.8-23

ceph-fuse: before 12.2.8-23

rbd-fuse: before 12.2.8-23

python3-cephfs: before 12.2.8-23

python-rbd: before 12.2.8-23

rbd-nbd: before 12.2.8-23

ceph: before 12.2.8-23

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1761


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###