CVE-2020-10736

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 Issue Tracking Third Party Advisory
https://ceph.io/releases/v15-2-2-octopus-released/ Release Notes Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 Issue Tracking Third Party Advisory
https://ceph.io/releases/v15-2-2-octopus-released/ Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 - Issue Tracking, Third Party Advisory
References () https://ceph.io/releases/v15-2-2-octopus-released/ - Release Notes, Vendor Advisory () https://ceph.io/releases/v15-2-2-octopus-released/ - Release Notes, Vendor Advisory

Information

Published : 2020-06-22 18:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10736

Mitre link : CVE-2020-10736

CVE.ORG link : CVE-2020-10736


JSON object : View

Products Affected

linuxfoundation

  • ceph
CWE
CWE-285

Improper Authorization

NVD-CWE-Other