Lucene search

K
cvelistRedhatCVELIST:CVE-2018-1079
HistoryApr 12, 2018 - 5:00 p.m.

CVE-2018-1079

2018-04-1217:00:00
CWE-552
redhat
www.cve.org
1

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.

CNA Affected

[
  {
    "product": "pcs",
    "vendor": "unspecified",
    "versions": [
      {
        "status": "affected",
        "version": "pcs 0.9.164"
      },
      {
        "status": "affected",
        "version": " pcs 0.10"
      }
    ]
  }
]

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%