Vulnerabilities
Vulnerable Software
Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.
CVSS Score
8.2
EPSS Score
0.006
Published
2022-03-11
An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol instead of the more secure HTTPS.
CVSS Score
5.9
EPSS Score
0.002
Published
2022-02-20
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
CVSS Score
7.1
EPSS Score
0.0
Published
2022-02-20
An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)
CVSS Score
7.8
EPSS Score
0.0
Published
2022-02-19
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
CVSS Score
9.8
EPSS Score
0.941
Published
2021-10-04
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
CVSS Score
7.5
EPSS Score
0.035
Published
2021-10-04
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
CVSS Score
7.5
EPSS Score
0.0
Published
2021-10-04
Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user.
CVSS Score
9.8
EPSS Score
0.013
Published
2018-01-03
The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.
CVSS Score
6.8
EPSS Score
0.007
Published
2014-10-27


Contact Us

Shodan ® - All rights reserved