CVE-2024-48916

EUVD-2024-54839
Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
GitHub_MCNA
8.1 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
cephceph
𝑥
≤ 19.2.3
CNA
Debian logo
Debian Releases
Debian Product
Codename
ceph
bookworm
16.2.15+ds-0+deb12u1
fixed
bookworm (security)
16.2.15+ds-0+deb12u1
fixed
bullseye
14.2.21-1
not-affected
bullseye (security)
14.2.21-1+deb11u1
fixed
forky
18.2.7+ds-1
fixed
sid
18.2.7+ds-1
fixed
trixie
18.2.7+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
bionic
not-affected
focal
not-affected
jammy
Fixed 17.2.7-0ubuntu0.22.04.2
released
noble
Fixed 19.2.0-0ubuntu0.24.04.2
released
oracular
Fixed 19.2.0-0ubuntu2.1
released
plucky
Fixed 19.2.0-0ubuntu6
released
trusty
not-affected
xenial
not-affected