

<!DOCTYPE html>
<html class="writer-html5" lang="en" >
<head>
  <meta charset="utf-8" />
  <meta name="generator" content="Docutils 0.19: https://docutils.sourceforge.io/" />

  <meta name="viewport" content="width=device-width, initial-scale=1.0" />
  
  <title>Past vulnerabilities &mdash; Ceph Documentation</title>
  

  
  <link rel="stylesheet" href="../../_static/ceph.css" type="text/css" />
  <link rel="stylesheet" href="../../_static/pygments.css" type="text/css" />
  <link rel="stylesheet" href="../../_static/pygments.css" type="text/css" />
  <link rel="stylesheet" href="../../_static/ceph.css" type="text/css" />
  <link rel="stylesheet" href="../../_static/graphviz.css" type="text/css" />
  <link rel="stylesheet" href="../../_static/css/custom.css" type="text/css" />

  
  

  
  

  

  
  <!--[if lt IE 9]>
    <script src="../../_static/js/html5shiv.min.js"></script>
  <![endif]-->
  
    
      <script type="text/javascript" id="documentation_options" data-url_root="../../" src="../../_static/documentation_options.js"></script>
        <script src="../../_static/jquery.js"></script>
        <script src="../../_static/_sphinx_javascript_frameworks_compat.js"></script>
        <script data-url_root="../../" id="documentation_options" src="../../_static/documentation_options.js"></script>
        <script src="../../_static/doctools.js"></script>
        <script src="../../_static/sphinx_highlight.js"></script>
    
    <script type="text/javascript" src="../../_static/js/theme.js"></script>

    
    <link rel="index" title="Index" href="../../genindex/" />
    <link rel="search" title="Search" href="../../search/" />
    <link rel="next" title="CVE-2022-0670: Native-CephFS Manila Path-restriction bypass" href="../CVE-2022-0670/" />
    <link rel="prev" title="Security" href="../" /> 
</head>

<body class="wy-body-for-nav">

   
  <header class="top-bar">
    <div role="navigation" aria-label="Page navigation">
  <ul class="wy-breadcrumbs">
      <li><a href="../../" class="icon icon-home" aria-label="Home"></a></li>
          <li class="breadcrumb-item"><a href="../">Security</a></li>
      <li class="breadcrumb-item active">Past vulnerabilities</li>
      <li class="wy-breadcrumbs-aside">
            <a href="../../_sources/security/cves.rst.txt" rel="nofollow"> View page source</a>
      </li>
  </ul>
  <hr/>
</div>
  </header>
  <div class="wy-grid-for-nav">
    
    <nav data-toggle="wy-nav-shift" class="wy-nav-side">
      <div class="wy-side-scroll">
        <div class="wy-side-nav-search"  style="background: #eee" >
          

          
            <a href="../../" class="icon icon-home"> Ceph
          

          
          </a>

          

          
<div role="search">
  <form id="rtd-search-form" class="wy-form" action="../../search/" method="get">
    <input type="text" name="q" placeholder="Search docs" aria-label="Search docs" />
    <input type="hidden" name="check_keywords" value="yes" />
    <input type="hidden" name="area" value="default" />
  </form>
</div>

          
        </div>

        
        <div class="wy-menu wy-menu-vertical" data-spy="affix" role="navigation" aria-label="main navigation">
          
            
            
              
            
            
              <ul class="current">
<li class="toctree-l1"><a class="reference internal" href="../../start/">Ceph 简介</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../install/">安装 Ceph</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../cephadm/">Cephadm</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../rados/">Ceph 存储集群</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../cephfs/">Ceph 文件系统</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../rbd/">Ceph 块设备</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../radosgw/">Ceph 对象网关</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../mgr/">Ceph 管理器守护进程</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../mgr/dashboard/">Ceph 仪表盘</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../monitoring/">监控概览</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../api/">API 文档</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../architecture/">体系结构</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../dev/developer_guide/">开发者指南</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../dev/internals/">Ceph 内幕</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../governance/">项目管理</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../foundation/">Ceph 基金会</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../ceph-volume/">ceph-volume</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../releases/general/">Ceph 版本（总目录）</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../releases/">Ceph 版本（索引）</a></li>
<li class="toctree-l1 current"><a class="reference internal" href="../">Security</a><ul class="current">
<li class="toctree-l2 current"><a class="current reference internal" href="#">Past Vulnerabilities / CVEs</a><ul>
<li class="toctree-l3"><a class="reference internal" href="../CVE-2022-0670/"> CVE-2022-0670</a></li>
<li class="toctree-l3"><a class="reference internal" href="../CVE-2021-3531/"> CVE-2021-3531</a></li>
<li class="toctree-l3"><a class="reference internal" href="../CVE-2021-3524/"> CVE-2021-3524</a></li>
<li class="toctree-l3"><a class="reference internal" href="../CVE-2021-3509/"> CVE-2021-3509</a></li>
<li class="toctree-l3"><a class="reference internal" href="../CVE-2021-20288/"> CVE-2021-20288</a></li>
</ul>
</li>
<li class="toctree-l2"><a class="reference internal" href="../process/">Vulnerability Management Process</a></li>
<li class="toctree-l2"><a class="reference internal" href="../#reporting-a-vulnerability">Reporting a vulnerability</a></li>
<li class="toctree-l2"><a class="reference internal" href="../#supported-versions">Supported versions</a></li>
</ul>
</li>
<li class="toctree-l1"><a class="reference internal" href="../../hardware-monitoring/">硬件监控</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../glossary/">Ceph 术语</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../jaegertracing/">Tracing</a></li>
<li class="toctree-l1"><a class="reference internal" href="../../translation_cn/">中文版翻译资源</a></li>
</ul>

            
          
        </div>
        
      </div>
    </nav>

    <section data-toggle="wy-nav-shift" class="wy-nav-content-wrap">

      
      <nav class="wy-nav-top" aria-label="top navigation">
        
          <i data-toggle="wy-nav-top" class="fa fa-bars"></i>
          <a href="../../">Ceph</a>
        
      </nav>


      <div class="wy-nav-content">
        
        <div class="rst-content">
        
          <div role="main" class="document" itemscope="itemscope" itemtype="http://schema.org/Article">
           <div itemprop="articleBody">
            
<div id="dev-warning" class="admonition note">
  <p class="first admonition-title">Notice</p>
  <p class="last">This document is for a development version of Ceph.</p>
</div>
  <div id="docubetter" align="right" style="padding: 5px; font-weight: bold;">
    <a href="https://pad.ceph.com/p/Report_Documentation_Bugs">Report a Documentation Bug</a>
  </div>

  
  <section id="past-vulnerabilities">
<h1>Past vulnerabilities<a class="headerlink" href="#past-vulnerabilities" title="Permalink to this heading"></a></h1>
<table class="docutils align-default">
<tbody>
<tr class="row-odd"><td><p>Published</p></td>
<td><p>CVE</p></td>
<td><p>Severity</p></td>
<td><p>Summary</p></td>
</tr>
<tr class="row-even"><td><p>2023-02-02</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/cve-2023-46159">CVE-2023-46159</a></p></td>
<td><p>Medium</p></td>
<td><p>DoS from RGW</p></td>
</tr>
<tr class="row-odd"><td><p>2023-01-17</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/cve-2022-3650">CVE-2022-3650</a></p></td>
<td><p>High</p></td>
<td><p>ceph-crash run as user, not root</p></td>
</tr>
<tr class="row-even"><td><p>2022-07-21</p></td>
<td><p><a class="reference external" href="../CVE-2022-0670">CVE-2022-0670</a></p></td>
<td><p>Medium</p></td>
<td><p>Native-CephFS Manila Path-restriction bypass</p></td>
</tr>
<tr class="row-odd"><td><p>2021-05-13</p></td>
<td><p><a class="reference external" href="../CVE-2021-3531">CVE-2021-3531</a></p></td>
<td><p>Medium</p></td>
<td><p>Swift API denial of service</p></td>
</tr>
<tr class="row-even"><td><p>2021-05-13</p></td>
<td><p><a class="reference external" href="../CVE-2021-3524">CVE-2021-3524</a></p></td>
<td><p>Medium</p></td>
<td><p>HTTP header injects via CORS in RGW</p></td>
</tr>
<tr class="row-odd"><td><p>2021-05-13</p></td>
<td><p><a class="reference external" href="../CVE-2021-3509">CVE-2021-3509</a></p></td>
<td><p>High</p></td>
<td><p>Dashboard XSS via token cookie</p></td>
</tr>
<tr class="row-even"><td><p>2021-04-14</p></td>
<td><p><a class="reference external" href="../CVE-2021-20288">CVE-2021-20288</a></p></td>
<td><p>High</p></td>
<td><p>Unauthorized global_id reuse in cephx</p></td>
</tr>
<tr class="row-odd"><td><p>2020-12-18</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27781">CVE-2020-27781</a></p></td>
<td><p>7.1 High</p></td>
<td><p>CephFS creds read/modified by Manila users</p></td>
</tr>
<tr class="row-even"><td><p>2021-01-08</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25678">CVE-2020-25678</a></p></td>
<td><p>4.9 Medium</p></td>
<td><p>mgr module passwords in clear text</p></td>
</tr>
<tr class="row-odd"><td><p>2020-12-07</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25677">CVE-2020-25677</a></p></td>
<td><p>5.5 Medium</p></td>
<td><p>ceph-ansible iscsi-gateway.conf perm</p></td>
</tr>
<tr class="row-even"><td><p>2020-11-23</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25660">CVE-2020-25660</a></p></td>
<td><p>8.8 High</p></td>
<td><p>Cephx replay vulnerability</p></td>
</tr>
<tr class="row-odd"><td><p>2020-04-22</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059</a></p></td>
<td><p>7.5 High</p></td>
<td><p>malformed POST could crash RGW</p></td>
</tr>
<tr class="row-even"><td><p>2020-06-26</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>HTTP header injects via CORS in RGW</p></td>
</tr>
<tr class="row-odd"><td><p>2020-06-22</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10736">CVE-2020-10736</a></p></td>
<td><p>8.0 High</p></td>
<td><p>authorization bypass in mon and mgr</p></td>
</tr>
<tr class="row-even"><td><p>2020-04-23</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1760">CVE-2020-1760</a></p></td>
<td><p>6.1 Medium</p></td>
<td><p>potential RGW XSS attack</p></td>
</tr>
<tr class="row-odd"><td><p>2020-04-13</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1759">CVE-2020-1759</a></p></td>
<td><p>6.8 Medium</p></td>
<td><p>Cephx nonce reuse in secure mode</p></td>
</tr>
<tr class="row-even"><td><p>2020-02-07</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1700">CVE-2020-1700</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>RGW disconnects leak sockets, can DoS</p></td>
</tr>
<tr class="row-odd"><td><p>2020-04-21</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1699">CVE-2020-1699</a></p></td>
<td><p>7.5 High</p></td>
<td><p>Dashboard path traversal flaw</p></td>
</tr>
<tr class="row-even"><td><p>2019-12-23</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19337">CVE-2019-19337</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>RGW DoS via malformed headers</p></td>
</tr>
<tr class="row-odd"><td><p>2019-11-08</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10222">CVE-2019-10222</a></p></td>
<td><p>7.5 High</p></td>
<td><p>Invalid HTTP headers could crash RGW</p></td>
</tr>
<tr class="row-even"><td><p>2019-03-27</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3821">CVE-2019-3821</a></p></td>
<td><p>7.5 High</p></td>
<td><p>RGW file descriptors could be exhausted</p></td>
</tr>
<tr class="row-odd"><td><p>2019-01-28</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889</a></p></td>
<td><p>7.5 High</p></td>
<td><p>encryption keys logged in plaintext</p></td>
</tr>
<tr class="row-even"><td><p>2019-01-15</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16846">CVE-2018-16846</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>authenticated RGW users can cause DoS</p></td>
</tr>
<tr class="row-odd"><td><p>2019-01-15</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14662">CVE-2018-14662</a></p></td>
<td><p>5.7 Medium</p></td>
<td><p>read-only users could steal dm-crypt keys</p></td>
</tr>
<tr class="row-even"><td><p>2018-07-10</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10861">CVE-2018-10861</a></p></td>
<td><p>8.1 High</p></td>
<td><p>authenticated user can create/delete pools</p></td>
</tr>
<tr class="row-odd"><td><p>2018-03-19</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7262">CVE-2018-7262</a></p></td>
<td><p>7.5 High</p></td>
<td><p>malformed headers can cause RGW DoS</p></td>
</tr>
<tr class="row-even"><td><p>2018-07-10</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1129">CVE-2018-1129</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>network MITM can tamper with messages</p></td>
</tr>
<tr class="row-odd"><td><p>2018-07-10</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128</a></p></td>
<td><p>7.5 High</p></td>
<td><p>Cephx replay vulnerability</p></td>
</tr>
<tr class="row-even"><td><p>2018-07-27</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7519">CVE-2017-7519</a></p></td>
<td><p>4.4 Medium</p></td>
<td><p>libradosstriper unvalidated format string</p></td>
</tr>
<tr class="row-odd"><td><p>2018-08-01</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9579">CVE-2016-9579</a></p></td>
<td><p>7.6 High</p></td>
<td><p>potential RGW XSS attack</p></td>
</tr>
<tr class="row-even"><td><p>2018-07-31</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8626">CVE-2016-8626</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>malformed POST can DoS RGW</p></td>
</tr>
<tr class="row-odd"><td><p>2016-10-03</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7031">CVE-2016-7031</a></p></td>
<td><p>7.5 High</p></td>
<td><p>RGW unauthorized bucket listing</p></td>
</tr>
<tr class="row-even"><td><p>2016-07-12</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5009">CVE-2016-5009</a></p></td>
<td><p>6.5 Medium</p></td>
<td><p>mon command handler DoS</p></td>
</tr>
<tr class="row-odd"><td><p>2016-12-03</p></td>
<td><p><a class="reference external" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5245">CVE-2015-5245</a></p></td>
<td></td>
<td><p>RGW header injection</p></td>
</tr>
</tbody>
</table>
<div class="toctree-wrapper compound">
</div>
</section>



<div id="support-the-ceph-foundation" class="admonition note">
  <p class="first admonition-title">Brought to you by the Ceph Foundation</p>
  <p class="last">The Ceph Documentation is a community resource funded and hosted by the non-profit <a href="https://ceph.io/en/foundation/">Ceph Foundation</a>. If you would like to support this and our other efforts, please consider <a href="https://ceph.io/en/foundation/join/">joining now</a>.</p>
</div>


           </div>
           
          </div>
          <footer><div class="rst-footer-buttons" role="navigation" aria-label="Footer">
        <a href="../" class="btn btn-neutral float-left" title="Security" accesskey="p" rel="prev"><span class="fa fa-arrow-circle-left" aria-hidden="true"></span> Previous</a>
        <a href="../CVE-2022-0670/" class="btn btn-neutral float-right" title="CVE-2022-0670: Native-CephFS Manila Path-restriction bypass" accesskey="n" rel="next">Next <span class="fa fa-arrow-circle-right" aria-hidden="true"></span></a>
    </div>

  <hr/>

  <div role="contentinfo">
    <p>&#169; Copyright 2016, Ceph authors and contributors. Licensed under Creative Commons Attribution Share Alike 3.0 (CC-BY-SA-3.0).</p>
  </div>

   

</footer>
        </div>
      </div>

    </section>

  </div>
  

  <script type="text/javascript">
      jQuery(function () {
          SphinxRtdTheme.Navigation.enable(true);
      });
  </script>

  
  
    
   

</body>
</html>