Lucene search

K
amazonAmazonALAS2-2023-2297
HistoryOct 12, 2023 - 3:09 p.m.

Medium: ceph-common

2023-10-1215:09:00
alas.aws.amazon.com
14
ceph-common
flaw
rgw
unprivileged
user
bucket
manipulation
form-data
post
cve-2023-43040

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.0%

Issue Overview:

A flaw was found in rgw. This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST’s form-data contains a key called ‘bucket’ with a value matching the bucket’s name used to sign the request. This issue results in a user being able to upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in the said POST form part. (CVE-2023-43040)

Affected Packages:

ceph-common

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update ceph-common to update your system.

New Packages:

aarch64:  
    ceph-common-10.2.5-4.amzn2.0.2.aarch64  
    librados2-10.2.5-4.amzn2.0.2.aarch64  
    librados2-devel-10.2.5-4.amzn2.0.2.aarch64  
    python-rados-10.2.5-4.amzn2.0.2.aarch64  
    librbd1-10.2.5-4.amzn2.0.2.aarch64  
    librbd1-devel-10.2.5-4.amzn2.0.2.aarch64  
    python-rbd-10.2.5-4.amzn2.0.2.aarch64  
    ceph-common-debuginfo-10.2.5-4.amzn2.0.2.aarch64  
  
i686:  
    ceph-common-10.2.5-4.amzn2.0.2.i686  
    librados2-10.2.5-4.amzn2.0.2.i686  
    librados2-devel-10.2.5-4.amzn2.0.2.i686  
    python-rados-10.2.5-4.amzn2.0.2.i686  
    librbd1-10.2.5-4.amzn2.0.2.i686  
    librbd1-devel-10.2.5-4.amzn2.0.2.i686  
    python-rbd-10.2.5-4.amzn2.0.2.i686  
    ceph-common-debuginfo-10.2.5-4.amzn2.0.2.i686  
  
src:  
    ceph-common-10.2.5-4.amzn2.0.2.src  
  
x86_64:  
    ceph-common-10.2.5-4.amzn2.0.2.x86_64  
    librados2-10.2.5-4.amzn2.0.2.x86_64  
    librados2-devel-10.2.5-4.amzn2.0.2.x86_64  
    python-rados-10.2.5-4.amzn2.0.2.x86_64  
    librbd1-10.2.5-4.amzn2.0.2.x86_64  
    librbd1-devel-10.2.5-4.amzn2.0.2.x86_64  
    python-rbd-10.2.5-4.amzn2.0.2.x86_64  
    ceph-common-debuginfo-10.2.5-4.amzn2.0.2.x86_64  

Additional References

Red Hat: CVE-2023-43040

Mitre: CVE-2023-43040

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.0%