pcs is prone to a cross-site request-forgery vulnerability because it fails to properly validate requests.
Exploiting this issue allows a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
Versions prior to pcs 0.9.149 are vulnerable.
Information
Redhat Enterprise Linux High Availability 7
Fedora Pacemaker Configuration System 0.9.137
Fedora Pacemaker Configuration System 0.9.140
Exploit
An attacker can exploit this issue using a web browser.
References: