exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

CVE-2022-2735

Status Candidate

Overview

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

Related Files

Debian Security Advisory 5226-1
Posted Sep 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5226-1 - Two security issues were discovered in pcs, a corosync and pacemaker configuration tool.

tags | advisory
systems | linux, debian
advisories | CVE-2022-1049, CVE-2022-2735
SHA-256 | 6063675b6309f8ba39ab444e7fce5c743b477418ff598c15909fc9e571447b45
Red Hat Security Advisory 2022-6341-01
Posted Sep 6, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-6341-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-2735
SHA-256 | e0b20711a59e8e3e913e7a9e5a225bf46d6c91e4374e978ae05e09773f2b31f5
Red Hat Security Advisory 2022-6314-01
Posted Sep 1, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-6314-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-2735
SHA-256 | 16fc3916e38c32fc532e18faa404d48887800bb13e0b41cdd0a9437f770a3d94
Red Hat Security Advisory 2022-6312-01
Posted Sep 1, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-6312-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-2735
SHA-256 | 2d911526a89fd8f16d9201f3633b5e8c1044f5c64d3aff72a166e9016eda8657
Red Hat Security Advisory 2022-6313-01
Posted Sep 1, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-6313-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-2735
SHA-256 | 2ab307dc0dd764fc91488fb9daa98765c23cf014cf5b0d13a8c25db7733c9a60
Simple House Rental System 1 Shell Upload
Posted Apr 8, 2022
Authored by D4rkP0w4r | Site github.com

Simple House Rental System version 1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2022-27352
SHA-256 | 08758f678f8c4fc418d8d9517c841f053dbffc2e1507149c1a99fb38c15f3933
E-Commerce Website 1.0 Shell Upload
Posted Apr 8, 2022
Authored by D4rkP0w4r | Site github.com

E-Commerce Website version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2022-27357
SHA-256 | 7a3aaebde457cfdba6fc15fa5c0b8bd1116d56a78bad78ee7de4f9c3d3574ed1
PHPGurukul Zoo Management System 1.0 Shell Upload
Posted Apr 8, 2022
Authored by D4rkP0w4r | Site github.com

PHPGurukul Zoo Management System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
advisories | CVE-2022-27351
SHA-256 | dca1f178a16cf53e52736d7b787820a9fbabb32e64848116ca5fc2680795d6d7
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close