CVE-2020-27781

EUVD-2020-20285
User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
redhatceph
𝑥
< 14.2.16
redhatceph
15.0.0 ≤
𝑥
< 15.2.8
redhatceph
16.0.0 ≤
𝑥
< 16.2.0
redhatceph_storage
2.0
redhatceph_storage
3.0
redhatceph_storage
4.0
redhatopenshift_container_platform
4.0
redhatopenstack_platform
13.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ceph
bookworm
16.2.11+ds-2
fixed
bullseye
14.2.21-1
fixed
sid
18.2.4+ds-7
fixed
stretch
postponed
trixie
18.2.4+ds-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
bionic
Fixed 12.2.13-0ubuntu0.18.04.10
released
focal
Fixed 15.2.12-0ubuntu0.20.04.1
released
groovy
Fixed 15.2.12-0ubuntu0.20.10.1
released
hirsute
Fixed 16.2.0-0ubuntu1
released
impish
Fixed 16.2.0-0ubuntu1
released
jammy
Fixed 16.2.0-0ubuntu1
released
kinetic
Fixed 16.2.0-0ubuntu1
released
lunar
Fixed 16.2.0-0ubuntu1
released
mantic
Fixed 16.2.0-0ubuntu1
released
noble
Fixed 16.2.0-0ubuntu1
released
trusty
needed
xenial
needed