A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_linux_server | Redhat | 7.0 | 7.0 |
Enterprise_linux_server | Redhat | 6.0 | 6.0 |
Virtualization_host | Redhat | 4.0 | 4.0 |
Virtualization | Redhat | 4.0 | 4.0 |
Gluster_storage | Redhat | 3.0 | 3.13.2 |