CVE Vulnerabilities

CVE-2018-10928

Improper Link Resolution Before File Access ('Link Following')

Published: Sep 04, 2018 | Modified: Apr 12, 2022
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Debian_linux Debian 8.0 (including) 8.0 (including)
Debian_linux Debian 9.0 (including) 9.0 (including)
Enterprise_linux Redhat 6.0 (including) 6.0 (including)
Enterprise_linux Redhat 7.0 (including) 7.0 (including)
Enterprise_linux_server Redhat 6.0 (including) 6.0 (including)
Enterprise_linux_server Redhat 7.0 (including) 7.0 (including)
Native Client for RHEL 6 for Red Hat Storage RedHat glusterfs-0:3.12.2-18.el6 *
Native Client for RHEL 7 for Red Hat Storage RedHat glusterfs-0:3.12.2-18.el7 *
Red Hat Gluster Storage 3.4 for RHEL 6 RedHat glusterfs-0:3.12.2-18.el6rhs *
Red Hat Gluster Storage 3.4 for RHEL 6 RedHat redhat-release-server-0:6Server-6.10.0.24.el6rhs *
Red Hat Gluster Storage 3.4 for RHEL 6 RedHat redhat-storage-server-0:3.4.0.0-1.el6rhs *
Red Hat Gluster Storage 3.4 for RHEL 7 RedHat glusterfs-0:3.12.2-18.el7rhgs *
Red Hat Gluster Storage 3.4 for RHEL 7 RedHat redhat-release-server-0:7.5-11.el7rhgs *
Red Hat Gluster Storage 3.4 for RHEL 7 RedHat redhat-storage-server-0:3.4.0.0-1.el7rhgs *
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 RedHat glusterfs-0:3.12.2-18.el7 *
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 RedHat imgbased-0:1.0.29-1.el7ev *
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 RedHat redhat-release-virtualization-host-0:4.2-7.3.el7 *
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 RedHat redhat-virtualization-host-0:4.2-20181026.0.el7_6 *
Glusterfs Ubuntu bionic *
Glusterfs Ubuntu cosmic *
Glusterfs Ubuntu esm-apps/bionic *
Glusterfs Ubuntu esm-apps/xenial *
Glusterfs Ubuntu trusty *
Glusterfs Ubuntu trusty/esm *
Glusterfs Ubuntu xenial *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References