First published: Wed Aug 12 2015(Updated: )
It was reported that it's possible to get access as a different user when using pcsd (the pcs web UI) due to using a variable which is global to the server instead of the connection to validate usernames. Scenario is following: User A sends a command to pcsd, after the connection is made and authentication happens, (but before any security checks are done), User B connects and authenticates. User A could potentially get access based on User B's permissions. To take advantage of this the user must have access to login to pcsd.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pacemaker/Corosync Configuration System | <=0.9.139 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5189 has a moderate severity rating due to its potential to allow unauthorized access to user accounts.
To fix CVE-2015-5189, update to a patched version of the Pacemaker/Corosync Configuration System that is higher than version 0.9.139.
CVE-2015-5189 affects the Pacemaker/Corosync Configuration System versions up to and including 0.9.139.
CVE-2015-5189 is an authentication vulnerability that allows for impersonation of another user.
As of the last report, there have been no known active exploits reported for CVE-2015-5189.