Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1086

Опубликовано: 12 апр. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 4.3

Описание

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

0.9.164-1
cosmic

ignored

end of life
devel

not-affected

0.10.1-2
disco

not-affected

0.10.1-2
eoan

not-affected

0.10.1-2
esm-apps/bionic

not-affected

0.9.164-1
esm-apps/focal

not-affected

0.10.1-2
esm-apps/jammy

not-affected

0.10.1-2
esm-apps/xenial

released

0.9.149-1ubuntu1.1+esm1

Показывать по

EPSS

Процентиль: 59%
0.00378
Низкий

5 Medium

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
redhat
больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
nvd
больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

CVSS3: 4.3
debian
больше 7 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug paramete ...

CVSS3: 7.5
github
больше 3 лет назад

pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.

oracle-oval
больше 7 лет назад

ELSA-2018-1060: pcs security update (IMPORTANT)

EPSS

Процентиль: 59%
0.00378
Низкий

5 Medium

CVSS2

4.3 Medium

CVSS3