CVE-2018-10841
glusterfs: access trusted peer group via remote-host command
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
glusterfs es vulnerable a un escalado de privilegios en los nodos del servidor gluster. Un cliente gluster autenticado mediante TLS podría emplear la interfaz de línea de comandos de gluster con el comando --remote-host para añadirse a sí mismo al pool de almacenamiento fiable y realizar operaciones gluster privilegiadas, como la adición de otras máquinas al pool de almacenamiento fiable, iniciar, detener y eliminar volúmenes.
A flaw was found in glusterfs which can lead to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-05-09 CVE Reserved
- 2018-06-20 CVE Published
- 2024-01-14 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10841 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://review.gluster.org/#/c/20328 | 2023-02-12 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1954 | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:1955 | 2023-02-12 | |
https://security.gentoo.org/glsa/201904-06 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2018-10841 | 2018-06-20 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1582043 | 2018-06-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gluster Search vendor "Gluster" | Glusterfs Search vendor "Gluster" for product "Glusterfs" | < 4.1.8 Search vendor "Gluster" for product "Glusterfs" and version " < 4.1.8" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|