Path traversal in ceph (Alpine package)



Published: 2020-01-29
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-1699
CWE-ID CWE-22
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ceph (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Path traversal

EUVDB-ID: #VU31992

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1699

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ceph (Alpine package): 14.2.3-r0 - 14.2.4-r3

External links

http://git.alpinelinux.org/aports/commit/?id=296bfafad9ccd8c577618c797685a106adb8f82e
http://git.alpinelinux.org/aports/commit/?id=3df0109a08bada58ac51dca96f58ea25df19aec2
http://git.alpinelinux.org/aports/commit/?id=d4b0d717cd724f077eb8b6eff1223ff01d10b6fc


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###