Bug 2216855 (CVE-2023-43040)
Summary: | CVE-2023-43040 rgw: improperly verified POST keys | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Anten Skrabec <askrabec> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | amctagga, aoconnor, bniver, dfreiber, etamir, flucifre, gmeno, jburrell, mbenjamin, mhackett, muagarwa, rogbas, security-response-team, sostapov, vereddy, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in rgw. This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST's form-data contains a key called 'bucket' with a value matching the bucket's name used to sign the request. This issue results in a user being able to upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in the said POST form part.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2216857, 2216858, 2216859, 2216860, 2216861, 2216862, 2216863, 2216864, 2216865, 2216866, 2216867, 2217572, 2258829, 2258830 | ||
Bug Blocks: | 2216856 |
Description
Anten Skrabec
2023-06-22 21:28:37 UTC
Hi Anten, This shouldn't impact OpenStack (at least directly). librgw is from the ceph package. OpenStack pulls this from RHEL or Ceph directly on all the releases. It will cause container grade updates after it's resolved. This issue has been addressed in the following products: Red Hat Ceph Storage 6.1 Via RHSA-2023:5693 https://access.redhat.com/errata/RHSA-2023:5693 This issue has been addressed in the following products: Red Hat Ceph Storage 5.3 Via RHSA-2024:0745 https://access.redhat.com/errata/RHSA-2024:0745 |