CVE-2018-1079

Public on 2018-04-12
Modified on 2018-04-26
Description
It was found that the REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
Severity
Important severity
Important
See what this means
CVSS v3 Base Score
8.7
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core pcs 2018-04-26 ALAS2-2018-1005 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 8.7 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
NVD CVSSv2 4.0 AV:N/AC:L/Au:S/C:N/I:P/A:N
NVD CVSSv3 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N