The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14654 | issue tracking vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3431 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3432 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3470 | vendor advisory |
https://security.gentoo.org/glsa/201904-06 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | third party advisory mailing list |