Privilege Escalation Vulnerability in Red Hat Ceph Storage by Ceph-iscsi-cli
CVE-2018-14649

9.8CRITICAL

Key Information:

Vendor

[unknown]

Vendor
CVE Published:
9 October 2018

What is CVE-2018-14649?

The ceph-isci-cli package utilized in Red Hat Ceph Storage 2 and 3 has been found to operate the python-werkzeug library in debug shell mode due to a misconfiguration. By setting debug=True in the rbd-target-api, it unwittingly exposes a debug shell to unauthorized users. Exploiting this vulnerability grants attackers the ability to remotely execute arbitrary commands with the privileges of the user running the application, effectively allowing privilege escalation, which can result in significant security risks.

Affected Version(s)

ceph-iscsi-cli

References

EPSS Score

64% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.