Description
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1510-1 | glusterfs security update |
Debian DLA |
DLA-2806-1 | glusterfs security update |
EUVD |
EUVD-2018-2960 | It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume. |
Ubuntu USN |
USN-4770-1 | GlusterFS vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T07:54:34.745Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-10904
No data.
Status : Modified
Published: 2018-09-04T13:29:09.327
Modified: 2024-11-21T03:42:16.133
Link: CVE-2018-10904
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN