#VU82112 Improper Authorization in Ceph - CVE-2023-43040
Published: October 17, 2023 / Updated: August 2, 2024
Ceph
Red Hat Inc.
Description
The vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to improper authorization in radogw API gateway in Ceph when processing POST requests. A remote unprivileged user can write to any bucket(s) accessible by a given key if a POST form-data contains a key called "bucket" with a value matching the bucket's name used to sign the request.