CVE-2018-1079
pcs: Privilege escalation via authorized user malicious REST call
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
pcs, en versiones anteriores a la 0.9.164 y 0.10, es vulnerable a un escalado de privilegios mediante una llamada REST maliciosa realizada por un usuario autorizado. La interfaz REST del servicio pcsd no saneó correctamente el nombre de archivo de la consulta /remote/put_file. Si el directorio /etc/booth existe, un atacante autenticado con permisos de escritura podría crear o sobrescribir archivos arbitrarios con datos arbitrarios fuera del directorio /etc/booth, en el contexto del proceso pcsd.
It was found that the REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-04 CVE Reserved
- 2018-04-11 CVE Published
- 2024-02-20 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-552: Files or Directories Accessible to External Parties
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1060 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1079 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2018-1079 | 2018-04-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1550243 | 2018-04-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Clusterlabs Search vendor "Clusterlabs" | Pacemaker Command Line Interface Search vendor "Clusterlabs" for product "Pacemaker Command Line Interface" | <= 0.9.164 Search vendor "Clusterlabs" for product "Pacemaker Command Line Interface" and version " <= 0.9.164" | - |
Affected
| ||||||
Clusterlabs Search vendor "Clusterlabs" | Pacemaker Command Line Interface Search vendor "Clusterlabs" for product "Pacemaker Command Line Interface" | 0.10 Search vendor "Clusterlabs" for product "Pacemaker Command Line Interface" and version "0.10" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.5 Search vendor "Redhat" for product "Enterprise Linux" and version "7.5" | - |
Affected
|