CVE-2018-1088

A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-04-18 16:29

Updated : 2024-02-28 16:25


NVD link : CVE-2018-1088

Mitre link : CVE-2018-1088

CVE.ORG link : CVE-2018-1088


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • leap

redhat

  • gluster_storage
  • virtualization_host
  • enterprise_linux_server
  • virtualization
CWE
CWE-266

Incorrect Privilege Assignment

NVD-CWE-noinfo