// For flags

CVE-2015-1848

pcs: improper web session variable signing

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

El demonio pcs (pcsd) en PCS 0.9.137 y anteriores no establece el indicador de seguridad en una cookie de sesión https, lo cual hace más fácil a atacantes remotos capturar dicha cookie interceptando la transmisión dentro de una sesión http. NOTA: este problema ha sido dividido (SPLIT) por ADT2 debido a diferentes tipos de vulnerabilidad. CVE-2015-3983 es para el problema con no configurar el indicador HTTPOnly.

It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-02-17 CVE Reserved
  • 2015-05-13 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2024-11-07 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-310: Cryptographic Issues
  • CWE-347: Improper Verification of Cryptographic Signature
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fedora
Search vendor "Fedora"
Pacemaker Configuration System
Search vendor "Fedora" for product "Pacemaker Configuration System"
<= 0.9.137
Search vendor "Fedora" for product "Pacemaker Configuration System" and version " <= 0.9.137"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux High Availability
Search vendor "Redhat" for product "Enterprise Linux High Availability"
6.0
Search vendor "Redhat" for product "Enterprise Linux High Availability" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux High Availability
Search vendor "Redhat" for product "Enterprise Linux High Availability"
7.0
Search vendor "Redhat" for product "Enterprise Linux High Availability" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux High Availability Eus
Search vendor "Redhat" for product "Enterprise Linux High Availability Eus"
6.6.z
Search vendor "Redhat" for product "Enterprise Linux High Availability Eus" and version "6.6.z"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux High Availability Eus
Search vendor "Redhat" for product "Enterprise Linux High Availability Eus"
7.1
Search vendor "Redhat" for product "Enterprise Linux High Availability Eus" and version "7.1"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Resilient Storage
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage"
6.0
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Resilient Storage
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage"
7.0
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Resilient Storage Eus
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage Eus"
6.6.z
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage Eus" and version "6.6.z"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Resilient Storage Eus
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage Eus"
7.1
Search vendor "Redhat" for product "Enterprise Linux Resilient Storage Eus" and version "7.1"
-
Affected