pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2018-04-12T16:00:00

Updated: 2024-08-05T03:51:48.471Z

Reserved: 2017-12-04T00:00:00

Link: CVE-2018-1086

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-12T16:29:00.417

Modified: 2019-10-09T23:38:05.070

Link: CVE-2018-1086

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-04-09T00:00:00Z

Links: CVE-2018-1086 - Bugzilla