Red Hat Storage 2.0 allows local users to overwrite arbitrary files via a symlink attack on the (1) e, (2) local-bricks.list, (3) bricks.err, or (4) limits.conf files in /tmp.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Storage_server | Redhat | 2.0 (including) | 2.0 (including) |
Red Hat Storage 2.0 | RedHat | appliance-0:2.0.6.0-2.el6rhs | * |
Red Hat Storage 2.0 | RedHat | glusterfs-0:3.3.0.14rhs-1.el6rhs | * |
Red Hat Storage 2.0 | RedHat | gluster-swift-plugin-0:1.0-7 | * |