Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-10736

Опубликовано: 22 июн. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.2
CVSS3: 8

Описание

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

15.2.3-0ubuntu1
eoan

ignored

end of life
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

released

15.2.7-0ubuntu0.20.04.2
esm-infra/xenial

not-affected

code not present
focal

released

15.2.7-0ubuntu0.20.04.2
groovy

released

15.2.3-0ubuntu1
precise/esm

not-affected

code not present

Показывать по

EPSS

Процентиль: 21%
0.00068
Низкий

5.2 Medium

CVSS2

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
redhat
больше 5 лет назад

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

CVSS3: 8
nvd
больше 5 лет назад

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

CVSS3: 8
debian
больше 5 лет назад

An authorization bypass vulnerability was found in Ceph versions 15.2. ...

CVSS3: 8
github
больше 3 лет назад

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

EPSS

Процентиль: 21%
0.00068
Низкий

5.2 Medium

CVSS2

8 High

CVSS3