Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.
History

Wed, 30 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 20:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider allows attackers to bypass JWT signature verification by supplying a token with "none" as the algorithm (alg). This occurs because the implementation fails to enforce strict signature validation, enabling attackers to forge valid tokens without a signature. Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.
Title ceph: rhceph-container: Authentication bypass in CEPH RadosGW Ceph is vulnerable to authentication bypass through RadosGW
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Thu, 08 May 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:7.1::el8

Mon, 28 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:6.1::el8

Tue, 31 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Thu, 12 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat ceph Storage
CPEs cpe:/a:redhat:ceph_storage:8.0::el9
Vendors & Products Redhat
Redhat ceph Storage

Tue, 03 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider allows attackers to bypass JWT signature verification by supplying a token with "none" as the algorithm (alg). This occurs because the implementation fails to enforce strict signature validation, enabling attackers to forge valid tokens without a signature.

Mon, 02 Dec 2024 14:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title ceph: rhceph-container: Authentication bypass in CEPH RadosGW
Weaknesses CWE-345
References
Metrics threat_severity

None

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-30T19:45:00.454Z

Updated: 2025-07-30T19:54:42.022Z

Reserved: 2024-10-09T22:06:46.172Z

Link: CVE-2024-48916

cve-icon Vulnrichment

Updated: 2025-07-30T19:54:34.502Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-30T20:15:33.423

Modified: 2025-07-31T18:42:37.870

Link: CVE-2024-48916

cve-icon Redhat

Severity : Important

Publid Date: 2024-12-02T00:00:00Z

Links: CVE-2024-48916 - Bugzilla