It was found that glusterfs server does not properly sanitize file paths in the “trusted.io-stats-dump” extended attribute which is used by the “debug/io-stats” translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 11 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 10 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 999 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 13 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |