9.8
CVSSv3

CVE-2018-14649

Published: 09/10/2018 Updated: 13/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthenticated malicious users to access this debug shell and escalate privileges. Once an attacker has successfully connected to this debug shell they will be able to execute arbitrary commands remotely. These commands will run with the same privileges as of user executing the application which is using python-werkzeug with debug shell mode enabled. In - Red Hat Ceph Storage 2 and 3, ceph-isci-cli package runs python-werkzeug library with root level permissions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat ceph storage 3.0

redhat ceph storage 2.0

redhat ceph-iscsi-cli -

Vendor Advisories

Synopsis Critical: ceph-iscsi-cli security update Type/Severity Security Advisory: Critical Topic An update for ceph-iscsi-cli is now available for Red Hat Ceph Storage 25 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnera ...
Synopsis Critical: ceph-iscsi-cli security update Type/Severity Security Advisory: Critical Topic An update for ceph-iscsi-cli is now available for Red Hat Ceph Storage 31 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnera ...
It was found that rbd-target-api service provided by ceph-iscsi-cli was running in debug mode An unauthenticated attacker could use this to remotely execute arbitrary code and escalate privileges ...