Project

General

Profile

Actions

Bug #13207

closed

CVE-2016-7031 rgw: Anonymous user is able to read bucket with authenticated read ACL

Added by Rahul Aggarwal over 8 years ago. Updated over 7 years ago.

Status:
Resolved
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Source:
other
Tags:
Backport:
hammer
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

When "authenticated-read" ACL is applied on a bucket; anonymous user is also able to read (eg. list) the bucket. But as per S3 documentation only authenticated users should be allowed to access the bucket.

For example, using python boto, using the below code, any anonymous user is able to list the bucket using the public url

@
import boto
import requests
import boto.s3.connection
from boto import exception
access_key = '8d52e5231eed4a899220e7e85affd840'
secret_key = '03ad4895c4f9465aa57ff8d116d9eebb'
boto.config.add_section("Boto")
boto.config.set("Boto", "num_retries", "1")
conn = boto.connect_s3(
aws_access_key_id = access_key,
aws_secret_access_key = secret_key,
port=80,
host = 'localhost',
is_secure=True,
calling_format = boto.s3.connection.OrdinaryCallingFormat(),
debug=1
)

bucket = conn.create_bucket("new_cont1")
bucket.set_canned_acl('authenticated-read')
key = bucket.new_key("one")
key.set_contents_from_string("testing bucket level acl")
url = bucket.generate_url(3600)
l = url.split("/")
url = l0 + "/" + "/" + l2 + "/" + l3
r = requests.get(url)
data = r.text
print data
assert (r.status_code == 403)
@


Files

testauthenticatedread.py (804 Bytes) testauthenticatedread.py Rahul Aggarwal, 09/23/2015 10:41 AM

Related issues 1 (0 open1 closed)

Copied to rgw - Backport #17150: hammer: rgw: Anonymous user is able to read bucket with authenticated read ACLResolvedNathan CutlerActions
Actions #1

Updated by Rahul Aggarwal over 8 years ago

attatching test code

Actions #2

Updated by Loïc Dachary over 8 years ago

  • Project changed from Ceph to rgw
Actions #3

Updated by Yehuda Sadeh over 8 years ago

  • Backport set to hammer

PR 6057

Actions #4

Updated by Nathan Cutler over 8 years ago

  • Status changed from New to Fix Under Review
Actions #5

Updated by Nathan Cutler over 7 years ago

  • Status changed from Fix Under Review to Pending Backport

https://github.com/ceph/ceph/pull/6057 was merged, but ticket status was not changed. Thanks to Osamu for bringing this to our attention via the ceph-devel mailing list.

Actions #6

Updated by Nathan Cutler over 7 years ago

  • Subject changed from Rados Gateway: Anonymous user is able to read bucket with authenticated read ACL to rgw: Anonymous user is able to read bucket with authenticated read ACL
Actions #7

Updated by Loïc Dachary over 7 years ago

  • Copied to Backport #17150: hammer: rgw: Anonymous user is able to read bucket with authenticated read ACL added
Actions #8

Updated by Ken Dreyer over 7 years ago

RH Security team has assigned CVE-2016-7031 to this issue.

Actions #9

Updated by Ken Dreyer over 7 years ago

  • Subject changed from rgw: Anonymous user is able to read bucket with authenticated read ACL to CVE-2016-7031 rgw: Anonymous user is able to read bucket with authenticated read ACL
Actions #10

Updated by Nathan Cutler over 7 years ago

  • Status changed from Pending Backport to Resolved
Actions

Also available in: Atom PDF