An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 | Issue Tracking Third Party Advisory |
| https://ceph.io/releases/v15-2-2-octopus-released/ | Release Notes Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 | Issue Tracking Third Party Advisory |
| https://ceph.io/releases/v15-2-2-octopus-released/ | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736 - Issue Tracking, Third Party Advisory | |
| References | () https://ceph.io/releases/v15-2-2-octopus-released/ - Release Notes, Vendor Advisory |
05 Aug 2022, 19:31
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-Other |
Information
Published : 2020-06-22 18:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10736
Mitre link : CVE-2020-10736
CVE.ORG link : CVE-2020-10736
JSON object : View
Products Affected
linuxfoundation
- ceph
CWE
