Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10699

Опубликовано: 23 мар. 2020
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

A flaw was found in Linux, where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

Отчет

Red Hat Enterprise Linux versions 7, 8.0 and 8.1 are not vulnerable to this flaw, because they do not ship a version of targetcli that contains the targetclid.socket socket. Red Hat Enterprise Linux version 8.2 is affected by this flaw. This issue did not affect the version of targetcli shipped with Red Hat Ceph Storage 2 and 3, as the package did not include the support for systemd which provides targetclid.socket socket.

Меры по смягчению последствий

  • Do not enable targetclid, this would prevent the socket to be created
  • Manually change the socket's permission every time it is being created : $ sudo chmod 0600 /var/run/targetclid.sock

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2targetcliNot affected
Red Hat Ceph Storage 3targetcliNot affected
Red Hat Enterprise Linux 7targetcliNot affected
Red Hat Enterprise Linux 8targetcliFixedRHSA-2020:193328.04.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1819219targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands

EPSS

Процентиль: 34%
0.00137
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

CVSS3: 7.8
nvd
почти 6 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

CVSS3: 7.8
debian
почти 6 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 ...

CVSS3: 7.8
github
больше 3 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

oracle-oval
почти 6 лет назад

ELSA-2020-1933: targetcli security update (IMPORTANT)

EPSS

Процентиль: 34%
0.00137
Низкий

7.8 High

CVSS3