An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 Issue Tracking Third Party Advisory
https://ceph.io/releases/v15-2-2-octopus-released/ Release Notes Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2020-06-22T17:49:38

Updated: 2020-06-22T17:49:38

Reserved: 2020-03-20T00:00:00


Link: CVE-2020-10736

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2020-06-22T18:15:10.993

Modified: 2023-11-07T03:14:18.253


Link: CVE-2020-10736

JSON object: View

cve-icon Redhat Information

No data.