#VU102357 Improper authentication in Ceph - CVE-2024-48916
Published: January 6, 2025
Ceph
Red Hat Inc.
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error when processing authentication requests within the WebTokenEngine::validate_signature() function in src/rgw/rgw_rest_sts.cc. A remote attacker can bypass authentication process and gain unauthorized access to the application.