Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-10904

Опубликовано: 04 сент. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.5
CVSS3: 8.8

Описание

It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

4.1.4-1
disco

not-affected

4.1.4-1
eoan

not-affected

4.1.4-1
esm-apps/bionic

released

3.13.2-1ubuntu1+esm1
esm-apps/focal

not-affected

4.1.4-1
esm-apps/xenial

released

3.7.6-1ubuntu1+esm1
esm-infra-legacy/trusty

released

3.4.2-1ubuntu1+esm1
focal

not-affected

4.1.4-1

Показывать по

EPSS

Процентиль: 79%
0.01279
Низкий

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
больше 7 лет назад

It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.

CVSS3: 8.8
nvd
больше 7 лет назад

It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.

CVSS3: 8.8
debian
больше 7 лет назад

It was found that glusterfs server does not properly sanitize file pat ...

CVSS3: 8.8
github
почти 4 года назад

It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.

suse-cvrf
около 6 лет назад

Security update for glusterfs

EPSS

Процентиль: 79%
0.01279
Низкий

6.5 Medium

CVSS2

8.8 High

CVSS3