An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 | Issue Tracking Third Party Advisory |
https://ceph.io/releases/v15-2-2-octopus-released/ | Release Notes Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 | Issue Tracking Third Party Advisory |
https://ceph.io/releases/v15-2-2-octopus-released/ | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 - Issue Tracking, Third Party Advisory | |
References | () https://ceph.io/releases/v15-2-2-octopus-released/ - Release Notes, Vendor Advisory |
Information
Published : 2020-06-22 18:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10736
Mitre link : CVE-2020-10736
CVE.ORG link : CVE-2020-10736
JSON object : View
Products Affected
linuxfoundation
- ceph
CWE