Total vulnerabilities in the database
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
Software | From | Fixed in |
---|---|---|
redhat / ceph_storage | - | 1.3.2.x |
ceph_project / ceph | - | 10.0.0.x |