
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider was discovered that allows attackers to bypass JWT signature verification. The vulnerability was first published on December 3, 2024, and affects multiple versions of Ceph software (Ubuntu Security, Red Hat Portal).
The vulnerability was introduced in Ceph version 16.1.0 through a specific commit (7566664f89be062e0c9f3519dc60b94c8af5e2a4). It affects the OIDC (OpenID Connect) provider implementation in RadosGW, specifically relating to JWT signature verification (Debian Tracker).
The vulnerability allows authentication bypass in the CEPH RadosGW system, potentially compromising the security of systems using OIDC authentication with RadosGW (Ubuntu Security).
Fixed versions have been released across multiple distributions. Ubuntu has released patches (19.2.0-0ubuntu2.1 for 24.10, 19.2.0-0ubuntu0.24.04.2 for 24.04 LTS, and 17.2.7-0ubuntu0.22.04.2 for 22.04 LTS). Debian has also released fixes for affected versions in bullseye, bookworm, and sid/trixie releases (Ubuntu Security, Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”