Vulnerability Description
Ceph is a distributed object, block, and file storage platform. In versions up to and including 19.2.3, using the argument `x-amz-copy-source` to put an object and specifying an empty string as its content leads to the RGW daemon crashing, resulting in a DoS attack. As of time of publication, no known patched versions exist.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Ceph | <= 19.2.3 |
Related Weaknesses (CWE)
References
- https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8ExploitVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/11/11/3Mailing List
- https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8ExploitVendor Advisory
FAQ
What is CVE-2024-47866?
CVE-2024-47866 is a vulnerability with a CVSS score of 7.5 (HIGH). Ceph is a distributed object, block, and file storage platform. In versions up to and including 19.2.3, using the argument `x-amz-copy-source` to put an object and specifying an empty string as its co...
How severe is CVE-2024-47866?
CVE-2024-47866 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-47866?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ceph.