First published: Wed Dec 13 2017(Updated: )
In EMC Isilon OneFS 8.1.0.0, 8.0.1.0 - 8.0.1.1, 8.0.0.0 - 8.0.0.4, 7.2.1.0 - 7.2.1.5, 7.2.0.x, and 7.1.1.x, a malicious compliance admin (compadmin) account user could exploit a vulnerability in isi_get_itrace or isi_get_profile maintenance scripts to run any shell script as system root on a cluster in compliance mode. This could potentially lead to an elevation of privilege for the compadmin user and violate compliance mode.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Isilon OneFS | =7.1.1.0 | |
EMC Isilon OneFS | =7.1.1.1 | |
EMC Isilon OneFS | =7.1.1.2 | |
EMC Isilon OneFS | =7.1.1.3 | |
EMC Isilon OneFS | =7.1.1.4 | |
EMC Isilon OneFS | =7.1.1.5 | |
EMC Isilon OneFS | =7.2.0.0 | |
EMC Isilon OneFS | =7.2.0.1 | |
EMC Isilon OneFS | =7.2.0.2 | |
EMC Isilon OneFS | =7.2.0.3 | |
EMC Isilon OneFS | =7.2.0.4 | |
EMC Isilon OneFS | =7.2.0.5 | |
EMC Isilon OneFS | =7.2.1.0 | |
EMC Isilon OneFS | =7.2.1.1 | |
EMC Isilon OneFS | =7.2.1.2 | |
EMC Isilon OneFS | =7.2.1.3 | |
EMC Isilon OneFS | =7.2.1.4 | |
EMC Isilon OneFS | =7.2.1.5 | |
EMC Isilon OneFS | =8.0.0.0 | |
EMC Isilon OneFS | =8.0.0.1 | |
EMC Isilon OneFS | =8.0.0.2 | |
EMC Isilon OneFS | =8.0.0.3 | |
EMC Isilon OneFS | =8.0.0.4 | |
EMC Isilon OneFS | =8.0.1.0 | |
EMC Isilon OneFS | =8.0.1.1 | |
EMC Isilon OneFS | =8.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14380 is a vulnerability in EMC Isilon OneFS that allows a malicious compliance admin account user to run any shell script as the system root on a cluster.
EMC Isilon OneFS versions 8.1.0.0, 8.0.1.0 - 8.0.1.1, 8.0.0.0 - 8.0.0.4, 7.2.1.0 - 7.2.1.5, 7.2.0.x, and 7.1.1.x are affected by CVE-2017-14380.
The severity of CVE-2017-14380 is high, with a CVSS score of 6.7.
A malicious compliance admin account user can exploit CVE-2017-14380 by using the isi_get_itrace or isi_get_profile maintenance scripts to run any shell script as the system root on a cluster.
Yes, you can find references for CVE-2017-14380 at the following links: http://seclists.org/fulldisclosure/2017/Dec/41 and http://www.securityfocus.com/bid/102210.