ceph is vulnerable to Improper Access Control. An attacker could exploit this vulnerability to upload malicious files to any bucket accessible by the specified access key. This could allow the attacker to compromise the data stored in the bucket, or to launch further attacks against the system.
CPE | Name | Operator | Version |
---|---|---|---|
ceph:sid | eq | 14.2.9-1+b1 | |
ceph:sid | eq | 14.2.21-1.1+b1 | |
ceph:sid | eq | 14.2.9-1+b1 | |
ceph:sid | eq | 14.2.21-1.1+b1 |