Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7xr9-rmm4-cq6v

Опубликовано: 07 сент. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

EPSS

Процентиль: 8%
0.00032
Низкий

7.8 High

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 8.4
redhat
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 7.8
nvd
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 7.8
debian
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to ...

oracle-oval
около 3 лет назад

ELSA-2022-9754: pcs security update (IMPORTANT)

EPSS

Процентиль: 8%
0.00032
Низкий

7.8 High

CVSS3

Дефекты

CWE-276