CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
92.2%
Simple Git is used by IBM Storage Ceph in Grafana for Metrics. This bulletin identifies the steps to take to address the vulnerability in IBM Storage Ceph. CVE-2022-25912, CVE-2022-25860, CVE-2022-25908.
CVEID:CVE-2022-25912
**DESCRIPTION:**Node.js simple-git module could allow a remote attacker to execute arbitrary code on the system, caused by a flaw when enabling the ext transport protocol. By sending a specially-crafted request using the clone() method, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/241634 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID:CVE-2022-25860
**DESCRIPTION:**Nodejs simple-git module could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation by the clone(), pull(), push() and listRemote() methods. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/245489 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID:CVE-2022-25908
**DESCRIPTION:**Node.js create-choo-electron module could allow a remote attacker to execute arbitrary commands on the system, caused by improper input validation by the devInstall function. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/245495 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
IBM Storage Ceph | 7.0z1-z2 |
IBM Storage Ceph | 6.0, 6.1-6.1z6 |
IBM Storage Ceph | 5.3z1-z6 |
IBM strongly recommends addressing the vulnerability now.
Download the latest version of IBM Storage Ceph and upgrade to 7.1 by following instructions.
<https://public.dhe.ibm.com/ibmdl/export/pub/storage/ceph/>
<https://www.ibm.com/docs/en/storage-ceph/7?topic=upgrading>
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | storage_ceph | 7.0 | cpe:2.3:a:ibm:storage_ceph:7.0:*:*:*:*:*:*:* |
ibm | storage_ceph | 1 | cpe:2.3:a:ibm:storage_ceph:1:*:*:*:*:*:*:* |
ibm | storage_ceph | 2 | cpe:2.3:a:ibm:storage_ceph:2:*:*:*:*:*:*:* |
ibm | storage_ceph | 6.0 | cpe:2.3:a:ibm:storage_ceph:6.0:*:*:*:*:*:*:* |
ibm | storage_ceph | 6.1 | cpe:2.3:a:ibm:storage_ceph:6.1:*:*:*:*:*:*:* |
ibm | storage_ceph | 6 | cpe:2.3:a:ibm:storage_ceph:6:*:*:*:*:*:*:* |
ibm | storage_ceph | 5.3 | cpe:2.3:a:ibm:storage_ceph:5.3:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
92.2%