CVE-2020-27781

User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
VendorProductVersion
redhatceph
𝑥
< 14.2.16
redhatceph
15.0.0 ≤
𝑥
< 15.2.8
redhatceph
16.0.0 ≤
𝑥
< 16.2.0
redhatceph_storage
2.0
redhatceph_storage
3.0
redhatceph_storage
4.0
redhatopenshift_container_platform
4.0
redhatopenstack_platform
13.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ceph
bullseye
14.2.21-1
fixed
stretch
postponed
bookworm
16.2.11+ds-2
fixed
sid
18.2.4+ds-7
fixed
trixie
18.2.4+ds-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
noble
Fixed 16.2.0-0ubuntu1
released
mantic
Fixed 16.2.0-0ubuntu1
released
lunar
Fixed 16.2.0-0ubuntu1
released
kinetic
Fixed 16.2.0-0ubuntu1
released
jammy
Fixed 16.2.0-0ubuntu1
released
impish
Fixed 16.2.0-0ubuntu1
released
hirsute
Fixed 16.2.0-0ubuntu1
released
groovy
Fixed 15.2.12-0ubuntu0.20.10.1
released
focal
Fixed 15.2.12-0ubuntu0.20.04.1
released
bionic
Fixed 12.2.13-0ubuntu0.18.04.10
released
xenial
needed
trusty
needed