Bug 1510147 (CVE-2017-15103)
Summary: | CVE-2017-15103 heketi: OS command injection in heketi API | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | btotty, cbuissar, cperry, hchiramm, jarrpa, lpabon, madam, mliyazud, pprakash, ramkrsna, rcyriac, rhs-bugs, rtalur, security-response-team, sisharma, smohan, ssaha, storage-qa-internal, vbellur |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A security-check flaw was found in the way the Heketi server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-12-20 05:03:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1510283, 1527157, 1527158 | ||
Bug Blocks: | 1507642, 1510610 |
Description
Pedro Sampaio
2017-11-06 18:42:03 UTC
Acknowledgments: Name: Markus Krell (NTT Security) Created heketi tracking bugs for this issue: Affects: epel-all [bug 1527157] Affects: fedora-all [bug 1527158] This issue has been addressed in the following products: Red Hat Gluster Storage 3.3 for RHEL 7 Via RHSA-2017:3481 https://access.redhat.com/errata/RHSA-2017:3481 |