8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:P/A:N
0.003 Low
EPSS
Percentile
65.7%
In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7,
insufficient identifier checking in the LIO SCSI target code can be used by
remote attackers to read or write files via directory traversal in an XCOPY
request, aka CID-2896c93811e3. For example, an attack can occur over a
network if the attacker has access to one iSCSI LUN. The attacker gains
control over file access because I/O operations are proxied via an
attacker-selected backstore.
Author | Note |
---|---|
sbeattie | MITIGATION XCOPY support is enabled by default, but can be disabled via: echo 0 > /sys/kernel/config/target/core/<backstore>/<name>/attrib/emulate_3pc or targetcli /backstores/<backstore>/<name> set attribute emulate_3pc=0 . This workaround does not affect XCOPY requests sent to tcmu-runner based backstores. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-132.136 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-62.70 | UNKNOWN |
ubuntu | 20.10 | noarch | linux | < 5.8.0-38.43 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-184.235) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-200.232 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1093.99 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1037.39 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-aws | < 5.8.0-1020.22 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1085.89) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1121.135 | UNKNOWN |
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2896c93811e39d63a4d9b63ccf12a8fbc226e5e4
github.com/open-iscsi/tcmu-runner/pull/644
launchpad.net/bugs/cve/CVE-2020-28374
nvd.nist.gov/vuln/detail/CVE-2020-28374
security-tracker.debian.org/tracker/CVE-2020-28374
ubuntu.com/security/notices/USN-4694-1
ubuntu.com/security/notices/USN-4709-1
ubuntu.com/security/notices/USN-4711-1
ubuntu.com/security/notices/USN-4713-1
ubuntu.com/security/notices/USN-4713-2
ubuntu.com/security/notices/USN-4753-1
ubuntu.com/security/notices/USN-4901-1
www.cve.org/CVERecord?id=CVE-2020-28374
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:P/A:N
0.003 Low
EPSS
Percentile
65.7%