pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
2018-04-12T16:29:00.417
2024-11-21T03:59:09.063
Modified
CVSSv3.0: 4.3 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | clusterlabs | pacemaker_command_line_interface | 0.9.164 | Yes |
Application | clusterlabs | pacemaker_command_line_interface | 0.10 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | redhat | enterprise_linux_server_eus | 7.5 | Yes |
Operating System | redhat | enterprise_linux_server_eus | 7.6 | Yes |