8.1

CVE-2018-10861

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CephCeph Version10.2.0
CephCeph Version10.2.1
CephCeph Version10.2.2
CephCeph Version10.2.3
CephCeph Version10.2.4
CephCeph Version10.2.5
CephCeph Version10.2.6
CephCeph Version10.2.7
CephCeph Version10.2.8
CephCeph Version10.2.9
CephCeph Version10.2.10
CephCeph Version10.2.11
CephCeph Version12.2.0
CephCeph Version12.2.1
CephCeph Version12.2.2
CephCeph Version12.2.3
CephCeph Version12.2.4
CephCeph Version12.2.5
CephCeph Version12.2.6
CephCeph Version12.2.7
CephCeph Version13.2.0
CephCeph Version13.2.1
RedhatCeph Storage Version3
RedhatCeph Storage Mon Version2
RedhatCeph Storage Mon Version3
RedhatCeph Storage Osd Version2
RedhatCeph Storage Osd Version3
OpensuseLeap Version15.0
DebianDebian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.58% 0.679
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
nvd@nist.gov 5.5 8 4.9
AV:N/AC:L/Au:S/C:N/I:P/A:P
CWE-285 Improper Authorization

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.