CVE Vulnerabilities

CVE-2020-27839

Insufficiently Protected Credentials

Published: May 26, 2021 | Modified: Jun 03, 2021
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS 2.x
3.5 LOW
AV:N/AC:M/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.1 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
Ubuntu
MEDIUM

A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser’s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

Name Vendor Start Version End Version
Ceph Redhat * 14.2.17 (excluding)
Ceph Redhat 15.2.0 (including) 15.2.9 (excluding)
Red Hat Ceph Storage 4.2 RedHat ceph-2:14.2.11-181.el8cp *
Ceph Ubuntu devel *
Ceph Ubuntu focal *
Ceph Ubuntu groovy *
Ceph Ubuntu hirsute *
Ceph Ubuntu impish *
Ceph Ubuntu jammy *
Ceph Ubuntu precise/esm *
Ceph Ubuntu trusty *
Ceph Ubuntu upstream *
Ceph Ubuntu xenial *

Potential Mitigations

References