An improper input validation allows an unauthenticated attacker to alter PAM logs by sending a specially crafted HTTP request.