First published: Mon Jul 16 2018(Updated: )
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gluster GlusterFS | >=3.12.0<3.12.14 | |
Gluster GlusterFS | >=4.1.0<4.1.8 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10904.
The severity of CVE-2018-10904 is high with a severity value of 8.8.
The affected software includes GlusterFS versions 3.12.0 to 3.12.14 and 4.1.0 to 4.1.4, Redhat Virtualization Host 4.0, Redhat Enterprise Linux Server 6.0 and 7.0, Debian Linux 8.0 and 9.0, and openSUSE Leap 15.1.
An attacker can exploit CVE-2018-10904 by using the "trusted.io-stats-dump" extended attribute to create files and execute arbitrary code.
CVE-2018-10904 can be fixed by applying the appropriate patches provided by the software vendor.