|
Message-ID: <CABBoSthTBNKwjLs40gL6n7KZ9ojiSomYyNVdG=1Jfr7eN6ha1w@mail.gmail.com> Date: Fri, 14 May 2021 14:55:13 -0400 From: Ana McTaggart <amctagga@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE-2021-3509: Ceph: Cross Site Scripting via token Cookie Hello, A flaw was found in the Red Hat Ceph Storage Dashboard. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, ensuring that the vulnerability remains. We have assigned it a CVE of CVE-2021-3509, and released patches for it. Nautilus: https://github.com/ceph/ceph/commit/adda853e64bdba1288d46bc7d462d23d8f2f10ca Octopus: https://github.com/ceph/ceph/commit/7a1ca8d372da3b6a4fc3d221a0e5f72d1d61c27b Pacific: https://github.com/ceph/ceph/commit/af3fffab3b0f13057134d96e5d481e400d8bfd27 Ana McTaggart Red Hat Product Security Red Hat Remote <https://www.redhat.com> secalert@...hat.com for urgent response amct@...hat.com M: +1 (774)279-0791 <7742790791> IM: amctagga Pronouns:They/Them/Theirs
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.