CVE-2018-14649
ceph-iscsi-cli: rbd-target-api service runs in debug mode allowing for remote command execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthenticated attackers to access this debug shell and escalate privileges. Once an attacker has successfully connected to this debug shell they will be able to execute arbitrary commands remotely. These commands will run with the same privileges as of user executing the application which is using python-werkzeug with debug shell mode enabled. In - Red Hat Ceph Storage 2 and 3, ceph-isci-cli package runs python-werkzeug library with root level permissions.
Se ha detectado que el paquete ceph-isci-cli, tal y como se distribuye en Red Hat Ceph Storage 2 y 3, emplea python-werkzeug en modo de shell de depuración. Esto se logra estableciendo debug=True en el archivo /usr/bin/rbd-target-api proporcionado por el paquete ceph-isci-cli. Esto permite que atacantes no autenticados accedan al shell de depuración y escalen sus privilegios. Una vez el atacante se haya conectado exitosamente a este shell de depuración, será capaz de ejecutar comandos arbitrarios de forma remota. Estos comandos se ejecutarán con los mismos privilegios que los del usuario que ejecuta la aplicación que emplea python-werkzeug con el modo de shell de depuración habilitado. En Red Hat Ceph Storage 2 y 3, el paquete ceph-isci-cli ejecuta la biblioteca python-werkzeug con permisos de nivel root.
It was found that rbd-target-api service provided by ceph-iscsi-cli was running in debug mode. An unauthenticated attacker could use this to remotely execute arbitrary code and escalate privileges.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-07-27 CVE Reserved
- 2018-10-01 CVE Published
- 2024-07-24 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/105434 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/ceph/ceph-iscsi-cli/issues/120 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/articles/3623521 | 2018-10-01 | |
https://github.com/ceph/ceph-iscsi-cli/pull/121/commits/c3812075e30c76a800a961e7291087d357403f6b | 2023-02-13 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2837 | 2023-02-13 | |
https://access.redhat.com/errata/RHSA-2018:2838 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649 | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2018-14649 | 2018-10-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1632078 | 2018-10-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Ceph Storage Search vendor "Redhat" for product "Ceph Storage" | 2.0 Search vendor "Redhat" for product "Ceph Storage" and version "2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Ceph Storage Search vendor "Redhat" for product "Ceph Storage" | 3.0 Search vendor "Redhat" for product "Ceph Storage" and version "3.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Ceph-iscsi-cli Search vendor "Redhat" for product "Ceph-iscsi-cli" | - | - |
Affected
|