CVE Vulnerabilities

CVE-2018-10928

Improper Link Resolution Before File Access ('Link Following')

Published: Sep 04, 2018 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
Debian_linuxDebian8.0 (including)8.0 (including)
Debian_linuxDebian9.0 (including)9.0 (including)
Enterprise_linuxRedhat6.0 (including)6.0 (including)
Enterprise_linuxRedhat7.0 (including)7.0 (including)
Enterprise_linux_serverRedhat6.0 (including)6.0 (including)
Enterprise_linux_serverRedhat7.0 (including)7.0 (including)
Native Client for RHEL 6 for Red Hat StorageRedHatglusterfs-0:3.12.2-18.el6*
Native Client for RHEL 7 for Red Hat StorageRedHatglusterfs-0:3.12.2-18.el7*
Red Hat Gluster Storage 3.4 for RHEL 6RedHatglusterfs-0:3.12.2-18.el6rhs*
Red Hat Gluster Storage 3.4 for RHEL 6RedHatredhat-release-server-0:6Server-6.10.0.24.el6rhs*
Red Hat Gluster Storage 3.4 for RHEL 6RedHatredhat-storage-server-0:3.4.0.0-1.el6rhs*
Red Hat Gluster Storage 3.4 for RHEL 7RedHatglusterfs-0:3.12.2-18.el7rhgs*
Red Hat Gluster Storage 3.4 for RHEL 7RedHatredhat-release-server-0:7.5-11.el7rhgs*
Red Hat Gluster Storage 3.4 for RHEL 7RedHatredhat-storage-server-0:3.4.0.0-1.el7rhgs*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatglusterfs-0:3.12.2-18.el7*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatimgbased-0:1.0.29-1.el7ev*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatredhat-release-virtualization-host-0:4.2-7.3.el7*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatredhat-virtualization-host-0:4.2-20181026.0.el7_6*
GlusterfsUbuntubionic*
GlusterfsUbuntucosmic*
GlusterfsUbuntuesm-apps/bionic*
GlusterfsUbuntuesm-apps/xenial*
GlusterfsUbuntuesm-infra-legacy/trusty*
GlusterfsUbuntutrusty*
GlusterfsUbuntutrusty/esm*
GlusterfsUbuntuxenial*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References