cnvd-2015-05862
Vulnerability from cnvd
Title
PCS pcsd web UI操作系统命令注入漏洞
Description
PCS是一套利用命令行和Web UI来配置和管理Pacemaker和Corosync(集群软件)的工具。 PCS 0.9.139及之前版本的pcsd web UI中存在安全漏洞。远程攻击者可借助URL中的‘escape characters’利用该漏洞执行任意命令。
Severity
Patch Name
PCS pcsd web UI操作系统命令注入漏洞的补丁
Patch Description
PCS是一套利用命令行和Web UI来配置和管理Pacemaker和Corosync(集群软件)的工具。PCS 0.9.139及之前版本的pcsd web UI中存在安全漏洞。远程攻击者可借助URL中的‘escape characters’利用该漏洞执行任意命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://rhn.redhat.com/errata/RHSA-2015-1700.html

Reference
http://rhn.redhat.com/errata/RHSA-2015-1700.html
Impacted products
Name
PCS PCS <=0.9.139
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-5190"
    }
  },
  "description": "PCS\u662f\u4e00\u5957\u5229\u7528\u547d\u4ee4\u884c\u548cWeb UI\u6765\u914d\u7f6e\u548c\u7ba1\u7406Pacemaker\u548cCorosync\uff08\u96c6\u7fa4\u8f6f\u4ef6\uff09\u7684\u5de5\u5177\u3002\r\n\r\nPCS 0.9.139\u53ca\u4e4b\u524d\u7248\u672c\u7684pcsd web UI\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9URL\u4e2d\u7684\u2018escape characters\u2019\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002",
  "discovererName": "Adam Mari\u0161",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://rhn.redhat.com/errata/RHSA-2015-1700.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-05862",
  "openTime": "2015-09-09",
  "patchDescription": "PCS\u662f\u4e00\u5957\u5229\u7528\u547d\u4ee4\u884c\u548cWeb UI\u6765\u914d\u7f6e\u548c\u7ba1\u7406Pacemaker\u548cCorosync\uff08\u96c6\u7fa4\u8f6f\u4ef6\uff09\u7684\u5de5\u5177\u3002PCS 0.9.139\u53ca\u4e4b\u524d\u7248\u672c\u7684pcsd web UI\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9URL\u4e2d\u7684\u2018escape characters\u2019\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "PCS pcsd web UI\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "PCS PCS \u003c=0.9.139"
  },
  "referenceLink": "http://rhn.redhat.com/errata/RHSA-2015-1700.html",
  "serverity": "\u9ad8",
  "submitTime": "2015-09-06",
  "title": "PCS pcsd web UI\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…