Логотип exploitDog
bind:CVE-2018-1079
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1079

Количество 6

Количество 6

ubuntu логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
redhat логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
nvd логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
EPSS: Низкий
debian логотип

CVE-2018-1079

больше 7 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 8.7
EPSS: Низкий
github логотип

GHSA-wxjj-jh24-cx5f

больше 3 лет назад

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 6.5
EPSS: Низкий
oracle-oval логотип

ELSA-2018-1060

больше 7 лет назад

ELSA-2018-1060: pcs security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1079

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...

CVSS3: 8.7
0%
Низкий
больше 7 лет назад
github логотип
GHSA-wxjj-jh24-cx5f

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2018-1060

ELSA-2018-1060: pcs security update (IMPORTANT)

больше 7 лет назад

Уязвимостей на страницу