It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-09-04 13:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10904
Mitre link : CVE-2018-10904
CVE.ORG link : CVE-2018-10904
JSON object : View
Products Affected
redhat
- virtualization_host
- enterprise_linux_server
debian
- debian_linux
gluster
- glusterfs
opensuse
- leap
CWE
CWE-426
Untrusted Search Path