First published: Fri Sep 21 2018(Updated: )
The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Gluster Storage | <=4.1.4 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Virtualization | =4.0 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14654 is a vulnerability in the Gluster file system through version 4.1.4 that allows a remote attacker to create arbitrary, empty files on the target server.
An attacker with access to mount volumes can exploit CVE-2018-14654 by using the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
The affected software versions include Redhat Gluster Storage up to and including version 4.1.4, Redhat Enterprise Linux Server 6.0 and 7.0, Redhat Enterprise Linux Virtualization 4.0, Redhat Virtualization 4.0, Redhat Virtualization Host 4.0, and Debian Debian Linux 9.0.
CVE-2018-14654 has a severity value of 6.5, which is considered high.
To fix CVE-2018-14654, ensure you have updated to a patched version of the Gluster file system. Refer to the provided references for more information.