{"vulnerability": "cve-2024-41108", "sightings": [{"uuid": "fde5f196-4f63-43d7-ba5d-c4575c0b29ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-41108", "type": "seen", "source": "https://t.me/cvedetector/2164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41108 - FOG Hostinfo Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41108 \nPublished : July 31, 2024, 7:15 p.m. | 32\u00a0minutes ago \nDescription : FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings.  This vulnerability is fixed in 1.5.10.41. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T21:51:25.000000Z"}]}