Description
pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4169-1 | pcs security update |
Debian DSA |
DSA-4339-1 | ceph security update |
EUVD |
EUVD-2018-11736 | pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege. |
Ubuntu USN |
USN-7614-1 | pcs vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T03:51:48.471Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1086
No data.
Status : Modified
Published: 2018-04-12T16:29:00.417
Modified: 2024-11-21T03:59:09.063
Link: CVE-2018-1086
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN