Privilege Escalation Vulnerability in Red Hat Ceph Storage by Ceph-iscsi-cli
CVE-2018-14649
9.8CRITICAL
What is CVE-2018-14649?
The ceph-isci-cli package utilized in Red Hat Ceph Storage 2 and 3 has been found to operate the python-werkzeug library in debug shell mode due to a misconfiguration. By setting debug=True in the rbd-target-api, it unwittingly exposes a debug shell to unauthorized users. Exploiting this vulnerability grants attackers the ability to remotely execute arbitrary commands with the privileges of the user running the application, effectively allowing privilege escalation, which can result in significant security risks.
Affected Version(s)
ceph-iscsi-cli
References
EPSS Score
64% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved