Bug 1833025 (CVE-2020-10736) - CVE-2020-10736 ceph: authorization bypass in monitor and manager daemons
Summary: CVE-2020-10736 ceph: authorization bypass in monitor and manager daemons
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2020-10736
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1825383
TreeView+ depends on / blocked
 
Reported: 2020-05-07 16:47 UTC by Hardik Vyas
Modified: 2020-05-19 03:05 UTC (History)
25 users (show)

Fixed In Version: ceph 15.2.2
Doc Type: If docs needed, set a value
Doc Text:
An authorization bypass vulnerability was found in Ceph versions 15.2.0 and later, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
Clone Of:
Environment:
Last Closed: 2020-05-19 03:04:27 UTC


Attachments (Terms of Use)

Description Hardik Vyas 2020-05-07 16:47:37 UTC
In ceph-mon daemon, the "kludge" for older clients in handle_command() allows any authenticated client access to the three whitelisted commands. An attacker with "mon r" caps can exploit this, e.g. to change configuration parameters using injectargs. For ceph-mgr daemon, in handle_command(MCommand), messages are queued to adminsocket without access checks if fsid is present. This can be exploited by an attacker without manager caps to run any MCommand including "config set".

Comment 1 Hardik Vyas 2020-05-07 16:47:41 UTC
Acknowledgments:

Name: Olle Segerdahl

Comment 3 Hardik Vyas 2020-05-07 16:47:47 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 6 Summer Long 2020-05-08 04:55:34 UTC
Statement:

This vulnerability affects Ceph versions 15.2.0 and later. The following products do not ship the flawed versions and are therefore not affected by this flaw:
* Red Hat Ceph Storage 
* Red Hat OpenStack Platform

Comment 8 Hardik Vyas 2020-05-19 03:02:56 UTC
External References:

https://ceph.io/releases/v15-2-2-octopus-released/


Note You need to log in before you can comment on or make changes to this bug.