CVE-2018-10904 vulnerability in Gluster and Other Products
Published on September 4, 2018
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
Weakness Type
What is an Untrusted Path Vulnerability?
The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.
CVE-2018-10904 has been classified to as an Untrusted Path vulnerability or weakness.
Products Associated with CVE-2018-10904
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-10904 are published in these products:
Affected Versions
Red Hat glusterfs Version n/a is affected by CVE-2018-10904Exploit Probability
EPSS
1.28%
Percentile
79.32%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.