Authorization Bypass Vulnerability in Ceph Versions 15.2.0 - 15.2.2: Unauthorized Access to Resources

Authorization Bypass Vulnerability in Ceph Versions 15.2.0 - 15.2.2: Unauthorized Access to Resources

CVE-2020-10736 · HIGH Severity

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

Learn more about our Web Application Penetration Testing UK.