Metrics
Affected Vendors & Products
Wed, 30 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Jul 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider allows attackers to bypass JWT signature verification by supplying a token with "none" as the algorithm (alg). This occurs because the implementation fails to enforce strict signature validation, enabling attackers to forge valid tokens without a signature. | Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published. |
Title | ceph: rhceph-container: Authentication bypass in CEPH RadosGW | Ceph is vulnerable to authentication bypass through RadosGW |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ceph_storage:7.1::el8 |
Mon, 28 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ceph_storage:6.1::el8 |
Tue, 31 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat ceph Storage |
|
CPEs | cpe:/a:redhat:ceph_storage:8.0::el9 | |
Vendors & Products |
Redhat
Redhat ceph Storage |
Tue, 03 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider allows attackers to bypass JWT signature verification by supplying a token with "none" as the algorithm (alg). This occurs because the implementation fails to enforce strict signature validation, enabling attackers to forge valid tokens without a signature. |
Mon, 02 Dec 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | ceph: rhceph-container: Authentication bypass in CEPH RadosGW | |
Weaknesses | CWE-345 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-30T19:45:00.454Z
Updated: 2025-07-30T19:54:42.022Z
Reserved: 2024-10-09T22:06:46.172Z
Link: CVE-2024-48916

Updated: 2025-07-30T19:54:34.502Z

Status : Awaiting Analysis
Published: 2025-07-30T20:15:33.423
Modified: 2025-07-31T18:42:37.870
Link: CVE-2024-48916
