Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1079

Опубликовано: 09 апр. 2018
Источник: redhat
CVSS3: 8.7

Описание

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

It was found that the REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6pcsNot affected
Red Hat Enterprise Linux 8pcsNot affected
Red Hat Storage 3pcsNot affected
Red Hat Enterprise Linux 7pcsFixedRHSA-2018:106010.04.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-552
https://bugzilla.redhat.com/show_bug.cgi?id=1550243pcs: Privilege escalation via authorized user malicious REST call

8.7 High

CVSS3

Связанные уязвимости

CVSS3: 8.7
ubuntu
больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
nvd
больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
debian
больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 6.5
github
больше 3 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

oracle-oval
больше 7 лет назад

ELSA-2018-1060: pcs security update (IMPORTANT)

8.7 High

CVSS3