It was found that the REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
A security issue was found in pcs deamon that permits an authorized user (with write permission in pcsd) to escalate privileges and write to any file in the system using a malicious REST call.
Name: Ondrej Mular (Red Hat)
Created pcs tracking bugs for this issue:
Affects: fedora-all [bug 1565088]
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2018:1060 https://access.redhat.com/errata/RHSA-2018:1060