An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2020-06-22T17:49:38

Updated: 2024-08-04T11:14:14.781Z

Reserved: 2020-03-20T00:00:00

Link: CVE-2020-10736

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-22T18:15:10.993

Modified: 2024-11-21T04:55:57.890

Link: CVE-2020-10736

cve-icon Redhat

Severity : Important

Publid Date: 2020-05-18T00:00:00Z

Links: CVE-2020-10736 - Bugzilla