CVE-2024-48916
CBL Mariner vulnerability analysis and mitigation

Overview

A vulnerability in the Ceph Rados Gateway (RadosGW) OIDC provider allows attackers to bypass JWT signature verification in versions 19.2.3 and below. The vulnerability enables attackers to send a JWT token with 'none' as the JWT algorithm, effectively bypassing the signature verification process. This security issue was discovered during a penetration test and was assigned CVE-2024-48916 with a CVSS v3.1 base score of 8.1 (High) (Ubuntu CVE, GitHub Advisory).

Technical details

The vulnerability exists in the RadosGW OIDC provider implementation where the JWT signature verification can be bypassed by specifying 'none' as the JWT algorithm. The issue was introduced in version 16.1.0 through commit 7566664f89be062e0c9f3519dc60b94c8af5e2a4. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N, indicating network attack vector, low attack complexity, low privileges required, and no user interaction needed (Debian Tracker, GitHub Advisory).

Impact

The vulnerability allows attackers to bypass authentication mechanisms in the Ceph RadosGW, potentially leading to unauthorized access to the storage system. The CVSS metrics indicate high impact on both confidentiality and integrity of the system, though availability is not affected. This could result in unauthorized access to sensitive data and potential modification of system configurations (GitHub Advisory).

Mitigation and workarounds

Several distributions have released fixed versions: Ubuntu has patched versions 19.2.0-0ubuntu6 for 25.04, 19.2.0-0ubuntu2.1 for 24.10, 19.2.0-0ubuntu0.24.04.2 for 24.04 LTS, and 17.2.7-0ubuntu0.22.04.2 for 22.04 LTS. Debian has also released fixes for various versions including bullseye, bookworm, and sid (Ubuntu CVE, Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68973HIGH7
  • NixOSNixOS
  • gnupg2-gpgconf
NoYesDec 28, 2025
CVE-2025-13699HIGH7
  • MariaDB ServerMariaDB Server
  • mariadb:10.3::mariadb-common
NoYesDec 23, 2025
CVE-2025-68343MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesDec 23, 2025
CVE-2025-68972MEDIUM4.7
  • NixOSNixOS
  • gnupg2-smime
NoYesDec 27, 2025
CVE-2025-11961LOW1.9
  • CBL MarinerCBL Mariner
  • libpcap-devel-static
NoYesDec 31, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management