CVE-2018-10904 — Untrusted Search Path in Glusterfs
Severity
8.8HIGHNVD
EPSS
1.2%
top 20.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
Latest updateApr 30
Description
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages6 packages
Also affects: Debian Linux 8.0, 9.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-v93g-8xmc-xvqm: It was found that glusterfs server does not properly sanitize file paths in the "trusted↗2022-04-30
CVEList▶
CVE-2018-10904: It was found that glusterfs server does not properly sanitize file paths in the "trusted↗2018-09-04
OSV▶
CVE-2018-10904: It was found that glusterfs server does not properly sanitize file paths in the "trusted↗2018-09-04
📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code↗2018-09-05
Bugzilla▶
CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code [fedora-all]↗2018-09-04
Bugzilla▶
CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code↗2018-09-04
Bugzilla▶
CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code↗2018-07-16