Vulnerability Details : CVE-2016-7031
Potential exploit
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
Products affected by CVE-2016-7031
- cpe:2.3:a:redhat:ceph_storage:*:*:*:*:*:*:*:*
- cpe:2.3:a:ceph_project:ceph:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7031
0.51%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7031
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-7031
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7031
-
https://github.com/ceph/ceph/pull/6057
Bug #13207: Rados Gateway: Anonymous user is able to read bucket with authenticated read ACL by rahul1aggarwal · Pull Request #6057 · ceph/ceph · GitHubPatch;Vendor Advisory
-
http://tracker.ceph.com/issues/13207
Bug #13207: CVE-2016-7031 rgw: Anonymous user is able to read bucket with authenticated read ACL - rgw - CephExploit;Issue Tracking;Vendor Advisory
-
http://www.securityfocus.com/bid/93240
Red Hat Ceph CVE-2016-7031 Security Bypass Vulnerability
-
http://rhn.redhat.com/errata/RHSA-2016-1973.html
RHSA-2016:1973 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-1972.html
RHSA-2016:1972 - Security Advisory - Red Hat Customer PortalRelease Notes;Third Party Advisory
-
http://docs.ceph.com/docs/master/release-notes/#v10-0-1
404 Not FoundRelease Notes;Vendor Advisory
Jump to