CVE-2020-1699

A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1699 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1699 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:ceph:14.2.5:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:ceph:14.2.6:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:ceph:15.0.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:11

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1699 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1699 - Issue Tracking, Vendor Advisory

Information

Published : 2020-04-21 17:15

Updated : 2024-11-21 05:11


NVD link : CVE-2020-1699

Mitre link : CVE-2020-1699

CVE.ORG link : CVE-2020-1699


JSON object : View

Products Affected

linuxfoundation

  • ceph

redhat

  • ceph_storage
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')