CVE-2014-8177Improper Access Control in Redhat Gluster Storage Management Console

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 69.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 7
Latest updateMay 14

Description

The Red Hat gluster-swift package, as used in Red Hat Gluster Storage (formerly Red Hat Storage Server), allows remote authenticated users to bypass the max_meta_count constraint via multiple crafted requests which exceed the limit when combined.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

🔴Vulnerability Details

2
GHSA
GHSA-8qj2-2gmf-vrgg: The Red Hat gluster-swift package, as used in Red Hat Gluster Storage (formerly Red Hat Storage Server), allows remote authenticated users to bypass t2022-05-14
CVEList
CVE-2014-8177: The Red Hat gluster-swift package, as used in Red Hat Gluster Storage (formerly Red Hat Storage Server), allows remote authenticated users to bypass t2016-06-07

📋Vendor Advisories

1
Red Hat
gluster-swift metadata constraints are not correctly enforced2015-08-21

💬Community

1
Bugzilla
CVE-2014-8177 gluster-swift metadata constraints are not correctly enforced2015-08-27
CVE-2014-8177 — Improper Access Control in Redhat | cvebase