CVE-2018-1079

Impact:
Important
Public Date:
2018-04-09
CWE:
CWE-552
Bugzilla:
1550243: CVE-2018-1079 pcs: Privilege escalation via authorized user malicious REST call
It was found that the REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

Find out more about CVE-2018-1079 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 8.7
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required High
User Interaction None
Scope Changed
Confidentiality None
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (pcs) RHSA-2018:1060 2018-04-10

Affected Packages State

Platform Package State
Red Hat Gluster Storage 3 pcs Not affected
Red Hat Enterprise Linux 8 pcs Not affected
Red Hat Enterprise Linux 6 pcs Not affected

Acknowledgements

This issue was discovered by Ondrej Mular (Red Hat).
Last Modified