Описание
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | code not present |
| devel | released | 15.2.3-0ubuntu1 |
| eoan | ignored | end of life |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | not-affected | code not present |
| esm-infra/focal | released | 15.2.7-0ubuntu0.20.04.2 |
| esm-infra/xenial | not-affected | code not present |
| focal | released | 15.2.7-0ubuntu0.20.04.2 |
| groovy | released | 15.2.3-0ubuntu1 |
| precise/esm | not-affected | code not present |
Показывать по
EPSS
5.2 Medium
CVSS2
8 High
CVSS3
Связанные уязвимости
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
An authorization bypass vulnerability was found in Ceph versions 15.2. ...
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
EPSS
5.2 Medium
CVSS2
8 High
CVSS3