First published: Thu Jan 28 2021(Updated: )
Olle Segerdahl found that ceph-mon and ceph-mgr daemons did not properly restrict access, resulting in gaining access to unauthorized resources. An authenticated user could use this vulnerability to modify the configuration and possibly conduct further attacks. (CVE-2020-10736) Adam Mohammed found that Ceph Object Gateway was vulnerable to HTTP header injection via a CORS ExposeHeader tag. An attacker could use this to gain access or cause a crash. (CVE-2020-10753) Ilya Dryomov found that Cephx authentication did not verify Ceph clients correctly and was then vulnerable to replay attacks in Nautilus. An attacker could use the Ceph cluster network to authenticate via a packet sniffer and perform actions. This issue is a reintroduction of CVE-2018-1128. (CVE-2020-25660)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ceph | <15.2.7-0ubuntu0.20.10.3 | 15.2.7-0ubuntu0.20.10.3 |
=20.10 | ||
All of | ||
ubuntu/ceph-base | <15.2.7-0ubuntu0.20.10.3 | 15.2.7-0ubuntu0.20.10.3 |
=20.10 | ||
All of | ||
ubuntu/ceph-common | <15.2.7-0ubuntu0.20.10.3 | 15.2.7-0ubuntu0.20.10.3 |
=20.10 | ||
All of | ||
ubuntu/ceph | <15.2.7-0ubuntu0.20.04.2 | 15.2.7-0ubuntu0.20.04.2 |
=20.04 | ||
All of | ||
ubuntu/ceph-base | <15.2.7-0ubuntu0.20.04.2 | 15.2.7-0ubuntu0.20.04.2 |
=20.04 | ||
All of | ||
ubuntu/ceph-common | <15.2.7-0ubuntu0.20.04.2 | 15.2.7-0ubuntu0.20.04.2 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of CVE-2020-10736 is high.
An authenticated user can exploit CVE-2020-10736 to gain unauthorized access, modify configurations, and potentially conduct further attacks.
The recommended remedy for CVE-2020-10736 is to update to version 15.2.7-0ubuntu0.20.10.3 of the ceph package.
Ubuntu versions 20.10 and 20.04 are affected by CVE-2020-10736.
You can find more information about CVE-2020-10736 on the Ubuntu Security website.