While requesting a new block volume creation, at Heketi we dump the sensitive gluster-block volumes PASSWORD details in the logs. This is a very old bug, starting from the introduction of block volume support to heketi-v6.0.0.
Acknowledgments: Name: Prasanna Kumar Kalever (Red Hat)
Statement: The version of heketi shipped with Red Hat Gluster Storage 3 does not filter out gluster-block volume passwords, hence affected by this vulnerability.
Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
OpenShift 3.11 uses heketi-v4.0.0-95-gaaf40619 which isn't affected by this issue. The efs-provisioner container in OpenShift 4 doesn't include the vulnerable package (executors/cmdexec/block_volume) [1] [1] https://github.com/openshift/external-storage/blob/34efc4c2dc0f7032db94b760a9c563ef914cd285/Gopkg.lock#L325
Upstream PR: https://github.com/heketi/heketi/pull/1790
External References: https://github.com/heketi/heketi/releases/tag/v10.1.0
This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 7 Native Client for RHEL 7 for Red Hat Storage Via RHSA-2020:4143 https://access.redhat.com/errata/RHSA-2020:4143
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-10763
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2020:5633 https://access.redhat.com/errata/RHSA-2020:5633