6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
6.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.0%
Issue Overview:
A flaw was found in rgw. This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST’s form-data contains a key called ‘bucket’ with a value matching the bucket’s name used to sign the request. This issue results in a user being able to upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in the said POST form part. (CVE-2023-43040)
Affected Packages:
ceph-common
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update ceph-common to update your system.
New Packages:
aarch64:
ceph-common-10.2.5-4.amzn2.0.2.aarch64
librados2-10.2.5-4.amzn2.0.2.aarch64
librados2-devel-10.2.5-4.amzn2.0.2.aarch64
python-rados-10.2.5-4.amzn2.0.2.aarch64
librbd1-10.2.5-4.amzn2.0.2.aarch64
librbd1-devel-10.2.5-4.amzn2.0.2.aarch64
python-rbd-10.2.5-4.amzn2.0.2.aarch64
ceph-common-debuginfo-10.2.5-4.amzn2.0.2.aarch64
i686:
ceph-common-10.2.5-4.amzn2.0.2.i686
librados2-10.2.5-4.amzn2.0.2.i686
librados2-devel-10.2.5-4.amzn2.0.2.i686
python-rados-10.2.5-4.amzn2.0.2.i686
librbd1-10.2.5-4.amzn2.0.2.i686
librbd1-devel-10.2.5-4.amzn2.0.2.i686
python-rbd-10.2.5-4.amzn2.0.2.i686
ceph-common-debuginfo-10.2.5-4.amzn2.0.2.i686
src:
ceph-common-10.2.5-4.amzn2.0.2.src
x86_64:
ceph-common-10.2.5-4.amzn2.0.2.x86_64
librados2-10.2.5-4.amzn2.0.2.x86_64
librados2-devel-10.2.5-4.amzn2.0.2.x86_64
python-rados-10.2.5-4.amzn2.0.2.x86_64
librbd1-10.2.5-4.amzn2.0.2.x86_64
librbd1-devel-10.2.5-4.amzn2.0.2.x86_64
python-rbd-10.2.5-4.amzn2.0.2.x86_64
ceph-common-debuginfo-10.2.5-4.amzn2.0.2.x86_64
Red Hat: CVE-2023-43040
Mitre: CVE-2023-43040
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | ceph-common | < 10.2.5-4.amzn2.0.2 | ceph-common-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | librados2 | < 10.2.5-4.amzn2.0.2 | librados2-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | librados2-devel | < 10.2.5-4.amzn2.0.2 | librados2-devel-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | python-rados | < 10.2.5-4.amzn2.0.2 | python-rados-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | librbd1 | < 10.2.5-4.amzn2.0.2 | librbd1-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | librbd1-devel | < 10.2.5-4.amzn2.0.2 | librbd1-devel-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | python-rbd | < 10.2.5-4.amzn2.0.2 | python-rbd-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ceph-common-debuginfo | < 10.2.5-4.amzn2.0.2 | ceph-common-debuginfo-10.2.5-4.amzn2.0.2.aarch64.rpm |
Amazon Linux | 2 | i686 | ceph-common | < 10.2.5-4.amzn2.0.2 | ceph-common-10.2.5-4.amzn2.0.2.i686.rpm |
Amazon Linux | 2 | i686 | librados2 | < 10.2.5-4.amzn2.0.2 | librados2-10.2.5-4.amzn2.0.2.i686.rpm |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
6.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.0%