glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10841 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2018:1955 | third party advisory vendor advisory |
https://review.gluster.org/#/c/20328/ | third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:1954 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201904-06 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | third party advisory mailing list |