An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
References
| Link | Resource |
|---|---|
| https://ceph.io/releases/v15-2-2-octopus-released/ | Release Notes Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2020-06-22 11:15
Updated : 2022-08-05 12:31
NVD link : CVE-2020-10736
Mitre link : CVE-2020-10736
JSON object : View
CWE
Products Affected
linuxfoundation
- ceph


