pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-04-12T16:00:00

Updated: 2018-06-19T09:57:01

Reserved: 2017-12-04T00:00:00


Link: CVE-2018-1086

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-04-12T16:29:00.417

Modified: 2019-10-09T23:38:05.070


Link: CVE-2018-1086

JSON object: View

cve-icon Redhat Information

No data.