Beyond Security Blog

Ceph versions 15.2.0 before 15.2.2 Incorrect Authorization Vulnerability

Summary

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources.

Credit:

The information has been provided by Olle Segerdahl

The original article can be found at:https://ceph.io/releases/v15-2-2-octopus-released/

Details

This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

Vulnerable Systems:

Ceph versions 15.2.0 before 15.2.2

CVE Information:

CVE-2020-10736

Disclosure Timeline:
Published Date:6/22/2020

SecuriTeam

SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at securiteam.com to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us

By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.

Reviews