MEDIUM
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
http://tracker.ceph.com/issues/24838
http://www.securityfocus.com/bid/104742
https://access.redhat.com/errata/RHSA-2018:2177
https://access.redhat.com/errata/RHSA-2018:2179
https://access.redhat.com/errata/RHSA-2018:2261
https://access.redhat.com/errata/RHSA-2018:2274
https://bugzilla.redhat.com/show_bug.cgi?id=1593308
https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
Source: MITRE
Published: 2018-07-10
Updated: 2019-10-09
Type: CWE-287
Base Score: 5.5
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P
Impact Score: 4.9
Exploitability Score: 8
Severity: MEDIUM
Base Score: 8.1
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Impact Score: 5.2
Exploitability Score: 2.8
Severity: HIGH