Related Vulnerabilities: CVE-2020-10736  

An authorization bypass vulnerability was found in Ceph versions 15.2.0 and 15.2.1, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

Severity Medium

Remote Yes

Type Authentication bypass

Description

An authorization bypass vulnerability was found in Ceph versions 15.2.0 and 15.2.1, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

AVG-1290 ceph 15.2.0-1 15.2.2-1 Medium Not affected

https://docs.ceph.com/en/latest/releases/octopus/#v15-2-2-octopus
https://github.com/ceph/ceph/commit/f2cf2ce1bd9a86462510a7a12afa4e528b615df2