Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10841

Опубликовано: 20 июн. 2018
Источник: redhat
CVSS3: 6.6

Описание

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

A flaw was found in glusterfs which can lead to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

Отчет

Red Hat Enterprise Linux 6, 7 are not affected by this flaw as it only affects glusterfs-server package. Red Hat Virtualization Hypervisor is not impacted by this flaw, as it uses gluster in a controlled manner via vdsm.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6glusterfsNot affected
Red Hat Enterprise Linux 8glusterfsNot affected
Red Hat Virtualization 4redhat-virtualization-hostNot affected
Native Client for RHEL 6 for Red Hat StorageglusterfsFixedRHSA-2018:195520.06.2018
Native Client for RHEL 7 for Red Hat StorageglusterfsFixedRHSA-2018:195420.06.2018
Red Hat Gluster Storage 3.3 for RHEL 6glusterfsFixedRHSA-2018:195520.06.2018
Red Hat Gluster Storage 3.3 for RHEL 7glusterfsFixedRHSA-2018:195420.06.2018
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7glusterfsFixedRHSA-2018:195420.06.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1582043glusterfs: access trusted peer group via remote-host command

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 8.8
nvd
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 8.8
debian
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server node ...

CVSS3: 8.8
github
больше 3 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

6.6 Medium

CVSS3