CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
Lifecycle Timeline
4Description
Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.
Analysis
Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.
Technical Context
Privilege escalation allows a low-privileged user or process to gain elevated permissions beyond what was originally authorized. This vulnerability is classified as Improper Privilege Management (CWE-269).
Remediation
Apply the principle of least privilege. Keep systems patched. Monitor for suspicious privilege changes. Use mandatory access controls (SELinux, AppArmor).
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| upstream | released | 17.2.8,18.2.5,19.2.3 |
| oracular | ignored | end of life, was needs-triage |
| jammy | not-affected | 17.2.9-0ubuntu0.22.04.1 |
| bionic | not-affected | code not present |
| noble | not-affected | 19.2.3-0ubuntu1.24.04.1 |
| focal | not-affected | code not present |
| plucky | not-affected | 19.2.3-0ubuntu1.25.04.1 |
| trusty | not-affected | code not present |
| questing | not-affected | 19.2.3-0ubuntu1.25.10.1 |
| xenial | not-affected | code not present |
Debian
Bug #1108410| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 14.2.21-1+deb11u1 | - |
| bullseye (security) | fixed | 14.2.21-1+deb11u3 | - |
| bookworm, bookworm (security) | vulnerable | 16.2.15+ds-0+deb12u1 | - |
| trixie | fixed | 18.2.7+ds-1 | - |
| forky, sid | fixed | 18.2.7+ds-1.1 | - |
| (unstable) | fixed | 18.2.6-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-19240