{"id":"CVE-2018-1079","details":"pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.","modified":"2026-05-15T12:03:38.220984942Z","published":"2018-04-12T17:29:00.233Z","database_specific":{"unresolved_ranges":[{"vendor_product":"clusterlabs:pacemaker_command_line_interface","extracted_events":[{"last_affected":"0.10"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:clusterlabs:pacemaker_command_line_interface:0.10:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux","extracted_events":[{"last_affected":"7.0"},{"last_affected":"7.5"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1079"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}