The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/93240 | vdb entry |
https://github.com/ceph/ceph/pull/6057 | patch vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-1972.html | release notes third party advisory vendor advisory |
http://docs.ceph.com/docs/master/release-notes/#v10-0-1 | release notes vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-1973.html | vendor advisory |
http://tracker.ceph.com/issues/13207 | issue tracking exploit vendor advisory |