pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
References
Link Resource
https://access.redhat.com/errata/RHSA-2018:1060 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1079 Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-04-12T17:00:00

Updated: 2018-04-12T16:57:01

Reserved: 2017-12-04T00:00:00


Link: CVE-2018-1079

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-04-12T17:29:00.233

Modified: 2019-10-09T23:38:03.850


Link: CVE-2018-1079

JSON object: View

cve-icon Redhat Information

No data.