CVE-2018-1088
Published on: 04/18/2018 12:00:00 AM UTC
Last Modified on: 02/13/2023 04:53:00 AM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
- CVE-2018-1088 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Red Hat, Inc. - glusterfs version = 3.x
CVSS3 Score: 8.1 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
1558721 – (CVE-2018-1088) CVE-2018-1088 glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled | Issue Tracking Patch Vendor Advisory bugzilla.redhat.com text/html |
![]() |
[security-announce] openSUSE-SU-2020:0079-1: moderate: Security update f | lists.opensuse.org text/html |
![]() |
CVE-2018-1088 - Red Hat Customer Portal | access.redhat.com text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
CVE-2018-1088 glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled - Red Hat Customer Portal | access.redhat.com text/html |
![]() |
GlusterFS: Multiple Vulnerabilities (GLSA 201904-06) — Gentoo security | security.gentoo.org text/html |
![]() |
[SECURITY] [DLA 2806-1] glusterfs security update | lists.debian.org text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
Related QID Numbers
Exploit/POC from Github
Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Opensuse | Leap | 15.1 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Application | Redhat | Gluster Storage | All | All | All | All |
Application | Redhat | Virtualization | 4.0 | All | All | All |
Application | Redhat | Virtualization | 4.0 | All | All | All |
Application | Redhat | Virtualization Host | 4.0 | All | All | All |
Application | Redhat | Virtualization Host | 4.0 | All | All | All |
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE