First published: Tue Apr 21 2020(Updated: )
A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Ceph | =14.2.5 | |
Linuxfoundation Ceph | =14.2.6 | |
Linuxfoundation Ceph | =15.0.0 | |
Redhat Ceph Storage | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1699 is a path traversal vulnerability in the Ceph dashboard that allows an unauthenticated attacker to disclose information on the host machine.
Versions 14.2.5, 14.2.6, and 15.0.0 of Ceph storage are affected by CVE-2020-1699.
An unauthenticated attacker can exploit CVE-2020-1699 by using a path traversal technique to access files and directories on the host machine.
CVE-2020-1699 has been fixed in versions 14.2.7 and 15.1.0 of Ceph storage. It is recommended to update to these versions to mitigate the vulnerability.
You can find more information about CVE-2020-1699 at the following link: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1699