glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
References
Link | Resource |
---|---|
https://review.gluster.org/#/c/20328/ | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10841 | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1955 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1954 | Third Party Advisory |
https://security.gentoo.org/glsa/201904-06 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | Mailing List Third Party Advisory |
Information
Published : 2018-06-20 11:29
Updated : 2023-02-12 15:31
NVD link : CVE-2018-10841
Mitre link : CVE-2018-10841
JSON object : View
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
Products Affected
debian
- debian_linux
gluster
- glusterfs