CVE-2020-10736
Published: 22 June 2020
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
Notes
Author | Note |
---|---|
mdeslaur | introduced in 15.2.0 fixed in 15.2.3-0ubuntu0.20.04.1 in focal-updates, but not yet in security pocket. |
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
eoan |
Ignored
(end of life)
|
|
focal |
Released
(15.2.7-0ubuntu0.20.04.2)
|
|
groovy |
Released
(15.2.3-0ubuntu1)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(15.2.2)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/c7e7009a690621aacd4ac2c70c6469f25d692868 (master) upstream: https://github.com/ceph/ceph/commit/f2cf2ce1bd9a86462510a7a12afa4e528b615df2 (v15.2.2) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.0 |
Attack vector | Adjacent |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |