Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-10841

Опубликовано: 20 июн. 2018
Источник: debian
EPSS Низкий

Описание

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glusterfsfixed4.1.2-1package
glusterfsnot-affectedjessiepackage

Примечания

  • https://review.gluster.org/#/c/20328/

  • http://git.gluster.org/cgit/glusterfs.git/commit/?id=e8d928e34680079e42be6947ffacc4ddd7defca2

EPSS

Процентиль: 52%
0.00296
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 6.6
redhat
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 8.8
nvd
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 8.8
github
больше 3 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

EPSS

Процентиль: 52%
0.00296
Низкий