CVE-2018-1079

Public on 2018-04-12
Modified on 2018-04-26
Description
It was found that the REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
Severity
Important severity
Important
CVSS v3 Base Score
8.7
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core pcs 2018-04-26 ALAS2-2018-1005 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 8.7 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
NVD CVSSv2 4.0 AV:N/AC:L/Au:S/C:N/I:P/A:N
NVD CVSSv3 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N