A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser’s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ceph | Redhat | * | 14.2.17 (excluding) |
Ceph | Redhat | 15.2.0 (including) | 15.2.9 (excluding) |
Red Hat Ceph Storage 4.2 | RedHat | ceph-2:14.2.11-181.el8cp | * |
Ceph | Ubuntu | devel | * |
Ceph | Ubuntu | focal | * |
Ceph | Ubuntu | groovy | * |
Ceph | Ubuntu | hirsute | * |
Ceph | Ubuntu | impish | * |
Ceph | Ubuntu | jammy | * |
Ceph | Ubuntu | precise/esm | * |
Ceph | Ubuntu | trusty | * |
Ceph | Ubuntu | upstream | * |
Ceph | Ubuntu | xenial | * |