VYPR

Bitnami package

ceph

pkg:bitnami/ceph

Vulnerabilities (11)

  • CVE-2024-47866Nov 12, 2025
    affected < 20.2.1fixed 20.2.1

    Ceph is a distributed object, block, and file storage platform. In versions up to and including 19.2.3, using the argument `x-amz-copy-source` to put an object and specifying an empty string as its content leads to the RGW daemon crashing, resulting in a DoS attack. As of time of

  • CVE-2024-48916HigJul 30, 2025
    affected < 20.2.1fixed 20.2.1

    Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of p

  • CVE-2025-52555MedJun 26, 2025
    affected >= 17.2.7, < 17.2.8fixed 17.2.8

    Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The resu

  • CVE-2022-0670Jul 25, 2022
    affected >= 15.0.0, < 15.2.17fixed 15.2.17

    A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality

  • CVE-2021-20288Apr 15, 2021
    affected < 14.2.21fixed 14.2.21

    An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_i

  • CVE-2020-10753Jun 26, 2020
    affected < 14.2.21fixed 14.2.21

    A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the

  • CVE-2020-10736Jun 22, 2020
    affected >= 15.2.0, < 15.2.2fixed 15.2.2

    An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configurat

  • CVE-2020-1760Apr 23, 2020
    affected < 14.2.21fixed 14.2.21

    A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.

  • CVE-2020-12059Apr 22, 2020
    affected <= 13.2.9

    An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception.

  • CVE-2020-1699Apr 21, 2020
    affected >= 14.2.5, <= 14.2.5

    A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine r

  • CVE-2020-1759Apr 13, 2020
    affected < 14.2.21fixed 14.2.21

    A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by