Total vulnerabilities in the database
pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
Software | From | Fixed in |
---|---|---|
clusterlabs / pacemaker_command_line_interface | 0.10 | 0.10.x |
clusterlabs / pacemaker_command_line_interface | 0.9.164 | 0.9.164.x |
debian / debian_linux | 9.0 | 9.0.x |
redhat / enterprise_linux_server_eus | 7.5 | 7.5.x |
redhat / enterprise_linux_server_eus | 7.6 | 7.6.x |