CVE-2021-3139Improper Input Validation in Tcmu

Severity
8.1HIGHNVD
EPSS
0.9%
top 24.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateMay 24

Description

In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages2 packages

NVDtcmu-runner_project/tcmu-runner1.3.01.5.2
debiandebian/tcmu< tcmu 1.5.2-6 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-j364-gjm2-cwx8: In Open-iSCSI tcmu-runner 12022-05-24
OSV
CVE-2021-3139: In Open-iSCSI tcmu-runner 12021-01-13

📋Vendor Advisories

3
Ubuntu
TCMU vulnerability2021-01-28
Red Hat
tcmu-runner: SCSI target (LIO) write to any block on ILO backstore2021-01-13
Debian
CVE-2021-3139: tcmu - In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_ud...2021