24007 - Glusterfs
💡 学习提示: 本文档介绍 24007-24008-24009-49152 - GlusterFS 的渗透测试方法,适合信息安全初学者和从业人员参考。
⚠️ 法律声明: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。
信息收集
Install the client utilities on your attacking box:
- Peer discovery & health
- Volume reconnaissance
- Mount without privileges
If mounting fails, check /var/log/glusterfs/<vol_name>-<uid>.log on the client side. Common issues are:
- TLS enforcement (
option transport.socket.ssl on) - Address based access control (
option auth.allow <cidr>)
Certificate troubleshooting
Steal the following files from any authorised client node and place them in /etc/ssl/ (or the directory shown in the error log):
Known Vulnerabilities (2022-2025)
| CVE | Affected versions | Impact | Notes |
|---|---|---|---|
| CVE-2022-48340 | 10.0–10.4, 11.0 | Use-after-free in dht_setxattr_mds_cbk reachable through the network |
Remote 拒绝服务 and probable 远程代码执行. Fixed in 10.4.1 / 11.1. |
| CVE-2023-26253 | < 11.0 | Out-of-bounds read in FUSE notify handler | Remote crash via crafted FS operations; public PoC available. |
| CVE-2023-3775 | < 10.5 / 11.1 | Incorrect permission validation when mounting gluster_shared_storage |
Lets any unauthenticated client mount the admin volume – leads to priv-esc explained below. |
Always check
gluster --versionon every node; heterogeneous clusters are common after partial upgrades.
Exploiting gluster_shared_storage (提权)
Even in recent versions many administrators leave the special gluster_shared_storage volume world-readable because it simplifies geo-replication. The volume contains cronjob templates that run with root on every node.
If hooks/1/ is not present, look for /ss_bricks/ – the exact path may vary with the major version.
Denial-of-服务 PoC (CVE-2023-26253)
Running the script crashes glusterfsd < 11.0.
Hardening & Detection
-
Upgrade – current LTS is 11.1 (July 2025). All CVEs above are fixed.
-
Enable TLS for every brick:
-
Restrict clients with CIDR lists:
-
Expose management port 24007 only on a private VLAN or through SSH tunnels.
-
Watch logs:
tail -f /var/log/glusterfs/glusterd.logand configure audit-log feature (volume set <vol> features.audit-log on).