Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2016-7031
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.005
EPSS Ranking
65.5%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
4.3
References
http://docs.ceph.com/docs/master/release-notes/#v10-0-1
http://rhn.redhat.com/errata/RHSA-2016-1972.html
http://rhn.redhat.com/errata/RHSA-2016-1973.html
http://tracker.ceph.com/issues/13207
http://www.securityfocus.com/bid/93240
https://github.com/ceph/ceph/pull/6057
http://docs.ceph.com/docs/master/release-notes/#v10-0-1
http://rhn.redhat.com/errata/RHSA-2016-1972.html
http://rhn.redhat.com/errata/RHSA-2016-1973.html
http://tracker.ceph.com/issues/13207
http://www.securityfocus.com/bid/93240
https://github.com/ceph/ceph/pull/6057
Products affected by CVE-2016-7031
Ceph Project
»
Ceph
»
Version:
Any
cpe:2.3:a:ceph_project:ceph:*
Redhat
»
Ceph Storage
»
Version:
1.3
cpe:2.3:a:redhat:ceph_storage:1.3
Redhat
»
Ceph Storage
»
Version:
1.3.2
cpe:2.3:a:redhat:ceph_storage:1.3.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved