CVE-2024-48916
BaseFortify
Publication date: 2025-07-30
Last updated on: 2025-07-31
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ceph | ceph_radosgw | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Ceph versions 19.2.3 and below allows an attacker to send a JSON Web Token (JWT) with the algorithm set to "none", which causes the system to skip signature verification. This flaw is likely in the RadosGW OIDC provider, enabling potentially unauthorized access because the JWT signature is not checked.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access or privilege escalation since attackers can bypass JWT signature verification. This can compromise confidentiality and integrity of data within the Ceph storage platform, potentially allowing attackers to impersonate users or gain elevated permissions.