CVE-2021-3509

NameCVE-2021-3509
DescriptionA flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs988888

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ceph (PTS)stretch10.2.11-2fixed
stretch (security)10.2.11-2+deb9u1fixed
buster12.2.11+dfsg1-2.1fixed
bookworm, bullseye14.2.21-1fixed
sid14.2.21-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cephsourcestretch(not affected)
cephsourcebuster(not affected)
cephsource(unstable)14.2.21-1988888

Notes

[buster] - ceph <not-affected> (Vulnerable code introduced later)
[stretch] - ceph <not-affected> (Vulnerable code introduced later)
Nautilus: https://github.com/ceph/ceph/commit/adda853e64bdba1288d46bc7d462d23d8f2f10ca
Octopus: https://github.com/ceph/ceph/commit/7a1ca8d372da3b6a4fc3d221a0e5f72d1d61c27b
Pacific: https://github.com/ceph/ceph/commit/af3fffab3b0f13057134d96e5d481e400d8bfd27
https://www.openwall.com/lists/oss-security/2021/05/14/4
In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly
cookie, introducing the specific CVE-2021-3509 issue.

Search for package or bug name: Reporting problems