Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3139

Опубликовано: 13 янв. 2021
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.

A flaw was found in the Linux kernel’s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.

Отчет

This issue did not affect the version of tcmu-runner as shipped with Red Hat Gluster Storage 3, as it did not include support for Extended Copy (XCOPY). Red Hat Ceph Storage 3 and 4 are affected, as they ship an affected version of tcmu-runner with XCOPY. Red Hat OpenShift Container Storage (RHOCS) 4 shipped tcmu-runner package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of tcmu-runner package is no longer used and supported with the release of RHOCS 4.3.

Меры по смягчению последствий

As this feature can be guarded behind an authentication and firewall rules, limit access with firewall rules and enforcing strong password hygiene. This may not be a suitable option if many uncontrolled hosts mount the networked iSCSI device.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Openshift Container Storage 4tcmu-runnerWill not fix
Red Hat Storage 3tcmu-runnerNot affected
Red Hat Ceph Storage 3 - ELScephFixedRHSA-2021:151806.05.2021
Red Hat Ceph Storage 3 - ELSceph-ansibleFixedRHSA-2021:151806.05.2021
Red Hat Ceph Storage 3 - ELScephmetricsFixedRHSA-2021:151806.05.2021
Red Hat Ceph Storage 3 - ELSgrafanaFixedRHSA-2021:151806.05.2021
Red Hat Ceph Storage 3 - ELStcmu-runnerFixedRHSA-2021:151806.05.2021
Red Hat Ceph Storage 4.2cephFixedRHSA-2021:145228.04.2021
Red Hat Ceph Storage 4.2ceph-ansibleFixedRHSA-2021:145228.04.2021
Red Hat Ceph Storage 4.2gperftoolsFixedRHSA-2021:145228.04.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1916045tcmu-runner: SCSI target (LIO) write to any block on ILO backstore

EPSS

Процентиль: 75%
0.00912
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 5 лет назад

In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.

CVSS3: 8.1
nvd
около 5 лет назад

In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.

CVSS3: 8.1
debian
около 5 лет назад

In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy ...

suse-cvrf
около 5 лет назад

Security update for tcmu-runner

suse-cvrf
около 5 лет назад

Security update for tcmu-runner

EPSS

Процентиль: 75%
0.00912
Низкий

8.1 High

CVSS3