A flaw was found in the ceph-ansible playbook where it contained hardcoded passwords that were being used as default passwords while deploying Ceph services. Any authenticated attacker can abuse this flaw to brute-force Ceph deployments, and gain administrator access to Ceph clusters via the Ceph dashboard to initiate read, write, and delete Ceph clusters and also modify Ceph cluster configurations. Versions before ceph-ansible 6.0.0alpha1 are affected.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1795592 Exploit Issue Tracking Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2021-05-28T12:46:28

Updated: 2021-05-28T12:46:28

Reserved: 2019-11-27T00:00:00


Link: CVE-2020-1716

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-05-28T13:15:07.380

Modified: 2021-06-10T15:27:45.657


Link: CVE-2020-1716

JSON object: View

cve-icon Redhat Information

No data.

CWE