The session cookie is not invalidated on the server side when logging out of the web UI. It is invalidated in the browser's cookie cache but it still works on requests sent by hand. The cookie is also not invalidated when that same user log in again, meaning all cookies are stored in a pool of valid sessions that are only invalidated when the cookies expires (1 day). This can allow attackers to perform session fixation attacks.
Acknowledgements: Name: Martin Prpic (Red Hat Product Security)
Statement: This issue is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 6, as the web UI functionality is disabled by default in pcsd.
Upstream patches: https://github.com/feist/pcs/commit/bc6ad9086857559db57f4e3e6de66762291c0774 https://github.com/feist/pcs/commit/e9b28833d54a47ec441f6dbad0db96e1fc662a5b https://github.com/feist/pcs/commit/acdbbe8307e6f4a36b2c7754765e732e43fe8d17
Created pcs tracking bugs for this issue: Affects: fedora-all [bug 1308827]
pcs-0.9.149-2.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
pcs-0.9.149-2.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2596 https://rhn.redhat.com/errata/RHSA-2016-2596.html