Summary
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources.
Credit:
The information has been provided by Olle Segerdahl
The original article can be found at:https://ceph.io/releases/v15-2-2-octopus-released/
Details
This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
Vulnerable Systems:
Ceph versions 15.2.0 before 15.2.2
CVE Information:
Disclosure Timeline:
Published Date:6/22/2020