Vulnerabilities
Vulnerable Software
Gluster:  >> Glusterfs  >> 3.10.12  Security Vulnerabilities
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
CVSS Score
6.6
EPSS Score
0.004
Published
2018-06-20


Contact Us

Shodan ® - All rights reserved