Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-45083 (GCVE-0-2021-45083)
Vulnerability from cvelistv5 – Published: 2022-02-20 17:56 – Updated: 2024-08-04 04:32- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:32:13.664Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"name": "FEDORA-2022-0c6402a6a3",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"name": "FEDORA-2022-0649006be6",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"name": "FEDORA-2022-f1510aa454",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-26T17:06:39.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"name": "FEDORA-2022-0c6402a6a3",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"name": "FEDORA-2022-0649006be6",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"name": "FEDORA-2022-f1510aa454",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-45083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cobbler/cobbler/releases",
"refsource": "MISC",
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"name": "https://www.openwall.com/lists/oss-security/2022/02/18/3",
"refsource": "MISC",
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193671",
"refsource": "MISC",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"name": "FEDORA-2022-0c6402a6a3",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"name": "FEDORA-2022-0649006be6",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"name": "FEDORA-2022-f1510aa454",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-45083",
"datePublished": "2022-02-20T17:56:11.000Z",
"dateReserved": "2021-12-16T00:00:00.000Z",
"dateUpdated": "2024-08-04T04:32:13.664Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-45083",
"date": "2026-04-23",
"epss": "0.0003",
"percentile": "0.08523"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-45083\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-02-20T18:15:07.580\",\"lastModified\":\"2024-11-21T06:31:54.950\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en Cobbler versiones anteriores a 3.3.1. Los archivos en /etc/cobbler son legibles para el mundo. Dos de esos archivos contienen informaci\u00f3n confidencial que puede ser expuesta a un usuario local que tenga acceso no privilegiado al servidor. El archivo users.digest contiene el resumen sha2-512 de los usuarios en una instalaci\u00f3n local de Cobbler. En el caso de una contrase\u00f1a f\u00e1cil de adivinar, es trivial obtener la cadena en texto plano. El archivo settings.yaml contiene secretos como la contrase\u00f1a por defecto con hash\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.3.1\",\"matchCriteriaId\":\"8C1BBC09-CD18-4BF4-972E-356DB8A70996\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1193671\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/cobbler/cobbler/releases\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2022/02/18/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1193671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/cobbler/cobbler/releases\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2022/02/18/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
FKIE_CVE-2021-45083
Vulnerability from fkie_nvd - Published: 2022-02-20 18:15 - Updated: 2024-11-21 06:31| Vendor | Product | Version | |
|---|---|---|---|
| cobbler_project | cobbler | * | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 | |
| fedoraproject | fedora | 36 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1BBC09-CD18-4BF4-972E-356DB8A70996",
"versionEndExcluding": "3.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password."
},
{
"lang": "es",
"value": "Se ha detectado un problema en Cobbler versiones anteriores a 3.3.1. Los archivos en /etc/cobbler son legibles para el mundo. Dos de esos archivos contienen informaci\u00f3n confidencial que puede ser expuesta a un usuario local que tenga acceso no privilegiado al servidor. El archivo users.digest contiene el resumen sha2-512 de los usuarios en una instalaci\u00f3n local de Cobbler. En el caso de una contrase\u00f1a f\u00e1cil de adivinar, es trivial obtener la cadena en texto plano. El archivo settings.yaml contiene secretos como la contrase\u00f1a por defecto con hash"
}
],
"id": "CVE-2021-45083",
"lastModified": "2024-11-21T06:31:54.950",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-02-20T18:15:07.580",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
PYSEC-2022-38
Vulnerability from pysec - Published: 2022-02-20 18:15 - Updated: 2022-03-09 00:15An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
| Name | purl | cobbler | pkg:pypi/cobbler |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "cobbler",
"purl": "pkg:pypi/cobbler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.6.3-2",
"3.1.2",
"3.2.1",
"3.2.2",
"3.3.0"
]
}
],
"aliases": [
"CVE-2021-45083",
"GHSA-5946-mpw5-pqxx"
],
"details": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"id": "PYSEC-2022-38",
"modified": "2022-03-09T00:15:58.984313Z",
"published": "2022-02-20T18:15:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"type": "REPORT",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-5946-mpw5-pqxx"
}
]
}
SUSE-SU-2022:14891-1
Vulnerability from csaf_suse - Published: 2022-02-18 10:44 - Updated: 2022-02-18 10:44{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cobbler",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cobbler fixes the following issues:\n\n- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).\n\nThe following non-security bugs were fixed:\n\n- Move configuration files ownership to apache (bsc#1195906)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slesctsp3-cobbler-14891,slesctsp4-cobbler-14891",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_14891-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:14891-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-202214891-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:14891-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010255.html"
},
{
"category": "self",
"summary": "SUSE Bug 1193671",
"url": "https://bugzilla.suse.com/1193671"
},
{
"category": "self",
"summary": "SUSE Bug 1195906",
"url": "https://bugzilla.suse.com/1195906"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45083/"
}
],
"title": "Security update for cobbler",
"tracking": {
"current_release_date": "2022-02-18T10:44:54Z",
"generator": {
"date": "2022-02-18T10:44:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:14891-1",
"initial_release_date": "2022-02-18T10:44:54Z",
"revision_history": [
{
"date": "2022-02-18T10:44:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "koan-2.2.2-0.68.15.1.i586",
"product": {
"name": "koan-2.2.2-0.68.15.1.i586",
"product_id": "koan-2.2.2-0.68.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "koan-2.2.2-0.68.15.1.ia64",
"product": {
"name": "koan-2.2.2-0.68.15.1.ia64",
"product_id": "koan-2.2.2-0.68.15.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "koan-2.2.2-0.68.15.1.ppc64",
"product": {
"name": "koan-2.2.2-0.68.15.1.ppc64",
"product_id": "koan-2.2.2-0.68.15.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "koan-2.2.2-0.68.15.1.s390x",
"product": {
"name": "koan-2.2.2-0.68.15.1.s390x",
"product_id": "koan-2.2.2-0.68.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "koan-2.2.2-0.68.15.1.x86_64",
"product": {
"name": "koan-2.2.2-0.68.15.1.x86_64",
"product_id": "koan-2.2.2-0.68.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-clienttools:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-clienttools:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586"
},
"product_reference": "koan-2.2.2-0.68.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64"
},
"product_reference": "koan-2.2.2-0.68.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64"
},
"product_reference": "koan-2.2.2-0.68.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x"
},
"product_reference": "koan-2.2.2-0.68.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64"
},
"product_reference": "koan-2.2.2-0.68.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586"
},
"product_reference": "koan-2.2.2-0.68.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64"
},
"product_reference": "koan-2.2.2-0.68.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64"
},
"product_reference": "koan-2.2.2-0.68.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x"
},
"product_reference": "koan-2.2.2-0.68.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.2.2-0.68.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64"
},
"product_reference": "koan-2.2.2-0.68.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-45083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45083"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45083",
"url": "https://www.suse.com/security/cve/CVE-2021-45083"
},
{
"category": "external",
"summary": "SUSE Bug 1193671 for CVE-2021-45083",
"url": "https://bugzilla.suse.com/1193671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS:koan-2.2.2-0.68.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-18T10:44:54Z",
"details": "important"
}
],
"title": "CVE-2021-45083"
}
]
}
SUSE-SU-2022:0510-1
Vulnerability from csaf_suse - Published: 2022-02-18 10:45 - Updated: 2022-02-18 10:45| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cobbler",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cobbler fixes the following issues:\n\n- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).\n- CVE-2021-45082: Fixed incomplete template sanitation (bsc#1193678).\n\nThe following non-security bugs were fixed:\n\n- Fix issues with installation module logging and validation (bsc#1195918)\n- Move configuration files ownership to apache (bsc#1195906)\n- Remove hardcoded test credentials (bsc#1193673)\n- Prevent log pollution (bsc#1193675)\n- Missing sanity check on MongoDB configuration file (bsc#1193676)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-510,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-510",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0510-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0510-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220510-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0510-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010257.html"
},
{
"category": "self",
"summary": "SUSE Bug 1193671",
"url": "https://bugzilla.suse.com/1193671"
},
{
"category": "self",
"summary": "SUSE Bug 1193673",
"url": "https://bugzilla.suse.com/1193673"
},
{
"category": "self",
"summary": "SUSE Bug 1193675",
"url": "https://bugzilla.suse.com/1193675"
},
{
"category": "self",
"summary": "SUSE Bug 1193676",
"url": "https://bugzilla.suse.com/1193676"
},
{
"category": "self",
"summary": "SUSE Bug 1193678",
"url": "https://bugzilla.suse.com/1193678"
},
{
"category": "self",
"summary": "SUSE Bug 1195906",
"url": "https://bugzilla.suse.com/1195906"
},
{
"category": "self",
"summary": "SUSE Bug 1195918",
"url": "https://bugzilla.suse.com/1195918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45082 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45083/"
}
],
"title": "Security update for cobbler",
"tracking": {
"current_release_date": "2022-02-18T10:45:23Z",
"generator": {
"date": "2022-02-18T10:45:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0510-1",
"initial_release_date": "2022-02-18T10:45:23Z",
"revision_history": [
{
"date": "2022-02-18T10:45:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"product": {
"name": "cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"product_id": "cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-tests-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"product": {
"name": "cobbler-tests-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"product_id": "cobbler-tests-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-web-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"product": {
"name": "cobbler-web-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"product_id": "cobbler-web-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.1",
"product": {
"name": "SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
},
"product_reference": "cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-45082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45082"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the \"#from MODULE import\" substring. (Only lines beginning with #import are blocked.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45082",
"url": "https://www.suse.com/security/cve/CVE-2021-45082"
},
{
"category": "external",
"summary": "SUSE Bug 1193678 for CVE-2021-45082",
"url": "https://bugzilla.suse.com/1193678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-18T10:45:23Z",
"details": "important"
}
],
"title": "CVE-2021-45082"
},
{
"cve": "CVE-2021-45083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45083"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45083",
"url": "https://www.suse.com/security/cve/CVE-2021-45083"
},
{
"category": "external",
"summary": "SUSE Bug 1193671 for CVE-2021-45083",
"url": "https://bugzilla.suse.com/1193671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-8.22.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-18T10:45:23Z",
"details": "important"
}
],
"title": "CVE-2021-45083"
}
]
}
SUSE-SU-2022:0509-1
Vulnerability from csaf_suse - Published: 2022-02-18 10:45 - Updated: 2022-02-18 10:45| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cobbler",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cobbler fixes the following issues:\n\n- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).\n- CVE-2021-45082: Fixed incomplete template sanitation (bsc#1193678).\n\nThe following non-security bugs were fixed:\n\n- Fix issues with installation module logging and validation (bsc#1195918)\n- Move configuration files ownership to apache (bsc#1195906)\n- Remove hardcoded test credentials (bsc#1193673)\n- Prevent log pollution (bsc#1193675)\n- Missing sanity check on MongoDB configuration file (bsc#1193676) \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-509,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-509",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0509-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0509-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220509-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0509-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010259.html"
},
{
"category": "self",
"summary": "SUSE Bug 1193671",
"url": "https://bugzilla.suse.com/1193671"
},
{
"category": "self",
"summary": "SUSE Bug 1193673",
"url": "https://bugzilla.suse.com/1193673"
},
{
"category": "self",
"summary": "SUSE Bug 1193675",
"url": "https://bugzilla.suse.com/1193675"
},
{
"category": "self",
"summary": "SUSE Bug 1193676",
"url": "https://bugzilla.suse.com/1193676"
},
{
"category": "self",
"summary": "SUSE Bug 1193678",
"url": "https://bugzilla.suse.com/1193678"
},
{
"category": "self",
"summary": "SUSE Bug 1195906",
"url": "https://bugzilla.suse.com/1195906"
},
{
"category": "self",
"summary": "SUSE Bug 1195918",
"url": "https://bugzilla.suse.com/1195918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45082 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45083/"
}
],
"title": "Security update for cobbler",
"tracking": {
"current_release_date": "2022-02-18T10:45:09Z",
"generator": {
"date": "2022-02-18T10:45:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0509-1",
"initial_release_date": "2022-02-18T10:45:09Z",
"revision_history": [
{
"date": "2022-02-18T10:45:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cobbler-3.1.2-150300.5.14.1.noarch",
"product": {
"name": "cobbler-3.1.2-150300.5.14.1.noarch",
"product_id": "cobbler-3.1.2-150300.5.14.1.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-tests-3.1.2-150300.5.14.1.noarch",
"product": {
"name": "cobbler-tests-3.1.2-150300.5.14.1.noarch",
"product_id": "cobbler-tests-3.1.2-150300.5.14.1.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-web-3.1.2-150300.5.14.1.noarch",
"product": {
"name": "cobbler-web-3.1.2-150300.5.14.1.noarch",
"product_id": "cobbler-web-3.1.2-150300.5.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.2",
"product": {
"name": "SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cobbler-3.1.2-150300.5.14.1.noarch as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
},
"product_reference": "cobbler-3.1.2-150300.5.14.1.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-45082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45082"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the \"#from MODULE import\" substring. (Only lines beginning with #import are blocked.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45082",
"url": "https://www.suse.com/security/cve/CVE-2021-45082"
},
{
"category": "external",
"summary": "SUSE Bug 1193678 for CVE-2021-45082",
"url": "https://bugzilla.suse.com/1193678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-18T10:45:09Z",
"details": "important"
}
],
"title": "CVE-2021-45082"
},
{
"cve": "CVE-2021-45083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45083"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45083",
"url": "https://www.suse.com/security/cve/CVE-2021-45083"
},
{
"category": "external",
"summary": "SUSE Bug 1193671 for CVE-2021-45083",
"url": "https://bugzilla.suse.com/1193671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Server Module 4.2:cobbler-3.1.2-150300.5.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-18T10:45:09Z",
"details": "important"
}
],
"title": "CVE-2021-45083"
}
]
}
SUSE-SU-2022:0507-1
Vulnerability from csaf_suse - Published: 2022-02-18 10:44 - Updated: 2022-02-18 10:44| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cobbler",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cobbler fixes the following issues:\n\n- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).\n\nThe following non-security bugs were fixed:\n\n- Move configuration files ownership to apache (bsc#1195906) \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2022-507,SUSE-2022-507,SUSE-OpenStack-Cloud-8-2022-507,SUSE-OpenStack-Cloud-9-2022-507,SUSE-SLE-Manager-Tools-12-2022-507",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0507-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0507-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220507-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0507-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010260.html"
},
{
"category": "self",
"summary": "SUSE Bug 1193671",
"url": "https://bugzilla.suse.com/1193671"
},
{
"category": "self",
"summary": "SUSE Bug 1195906",
"url": "https://bugzilla.suse.com/1195906"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45083 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45083/"
}
],
"title": "Security update for cobbler",
"tracking": {
"current_release_date": "2022-02-18T10:44:04Z",
"generator": {
"date": "2022-02-18T10:44:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0507-1",
"initial_release_date": "2022-02-18T10:44:04Z",
"revision_history": [
{
"date": "2022-02-18T10:44:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cobbler-2.6.6-49.35.1.noarch",
"product": {
"name": "cobbler-2.6.6-49.35.1.noarch",
"product_id": "cobbler-2.6.6-49.35.1.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-tests-2.6.6-49.35.1.noarch",
"product": {
"name": "cobbler-tests-2.6.6-49.35.1.noarch",
"product_id": "cobbler-tests-2.6.6-49.35.1.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-web-2.6.6-49.35.1.noarch",
"product": {
"name": "cobbler-web-2.6.6-49.35.1.noarch",
"product_id": "cobbler-web-2.6.6-49.35.1.noarch"
}
},
{
"category": "product_version",
"name": "koan-2.6.6-49.35.1.noarch",
"product": {
"name": "koan-2.6.6-49.35.1.noarch",
"product_id": "koan-2.6.6-49.35.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Client Tools 12",
"product": {
"name": "SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cobbler-2.6.6-49.35.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:cobbler-2.6.6-49.35.1.noarch"
},
"product_reference": "cobbler-2.6.6-49.35.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cobbler-2.6.6-49.35.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:cobbler-2.6.6-49.35.1.noarch"
},
"product_reference": "cobbler-2.6.6-49.35.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cobbler-2.6.6-49.35.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:cobbler-2.6.6-49.35.1.noarch"
},
"product_reference": "cobbler-2.6.6-49.35.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "koan-2.6.6-49.35.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:koan-2.6.6-49.35.1.noarch"
},
"product_reference": "koan-2.6.6-49.35.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-45083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45083"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:cobbler-2.6.6-49.35.1.noarch",
"SUSE Manager Client Tools 12:koan-2.6.6-49.35.1.noarch",
"SUSE OpenStack Cloud 8:cobbler-2.6.6-49.35.1.noarch",
"SUSE OpenStack Cloud 9:cobbler-2.6.6-49.35.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45083",
"url": "https://www.suse.com/security/cve/CVE-2021-45083"
},
{
"category": "external",
"summary": "SUSE Bug 1193671 for CVE-2021-45083",
"url": "https://bugzilla.suse.com/1193671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:cobbler-2.6.6-49.35.1.noarch",
"SUSE Manager Client Tools 12:koan-2.6.6-49.35.1.noarch",
"SUSE OpenStack Cloud 8:cobbler-2.6.6-49.35.1.noarch",
"SUSE OpenStack Cloud 9:cobbler-2.6.6-49.35.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:cobbler-2.6.6-49.35.1.noarch",
"SUSE Manager Client Tools 12:koan-2.6.6-49.35.1.noarch",
"SUSE OpenStack Cloud 8:cobbler-2.6.6-49.35.1.noarch",
"SUSE OpenStack Cloud 9:cobbler-2.6.6-49.35.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-18T10:44:04Z",
"details": "important"
}
],
"title": "CVE-2021-45083"
}
]
}
WID-SEC-W-2023-2926
Vulnerability from csaf_certbund - Published: 2022-02-20 23:00 - Updated: 2023-11-14 23:00In cobbler existieren mehrere Schwachstellen. Die Fehler bestehen darin, dass die Funktion check_for_invalid_imports es dem Cheetah-Code ermöglichen kann, Python-Module über die Teilzeichenkette "#from MODULE import" in der Datei templar.py zu importieren, die Dateien in /etc/cobbler weltweit lesbar sind und die Routinen in mehreren Dateien das HTTP-Protokoll anstelle des sichereren HTTPS verwenden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen und vertrauliche Informationen offenzulegen.
In cobbler existieren mehrere Schwachstellen. Die Fehler bestehen darin, dass die Funktion check_for_invalid_imports es dem Cheetah-Code ermöglichen kann, Python-Module über die Teilzeichenkette "#from MODULE import" in der Datei templar.py zu importieren, die Dateien in /etc/cobbler weltweit lesbar sind und die Routinen in mehreren Dateien das HTTP-Protokoll anstelle des sichereren HTTPS verwenden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen und vertrauliche Informationen offenzulegen.
In cobbler existieren mehrere Schwachstellen. Die Fehler bestehen darin, dass die Funktion check_for_invalid_imports es dem Cheetah-Code ermöglichen kann, Python-Module über die Teilzeichenkette "#from MODULE import" in der Datei templar.py zu importieren, die Dateien in /etc/cobbler weltweit lesbar sind und die Routinen in mehreren Dateien das HTTP-Protokoll anstelle des sichereren HTTPS verwenden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen und vertrauliche Informationen offenzulegen.
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Cobbler ist ein Linux Installationsserver, welcher die schnelle Einrichtung von Netzwerk-Installationsumgebungen erm\u00f6glicht.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in cobbler ausnutzen, um Sicherheitsvorkehrungen zu umgehen und vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2926 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-2926.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2926 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2926"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6475-1 vom 2023-11-15",
"url": "https://ubuntu.com/security/notices/USN-6475-1"
},
{
"category": "external",
"summary": "Bugzilla Security Advisory vom 2022-02-20",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056388"
},
{
"category": "external",
"summary": "Bugzilla Security Advisory vom 2022-02-20",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056389"
},
{
"category": "external",
"summary": "Bugzilla Security Advisory vom 2022-02-20",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056390"
},
{
"category": "external",
"summary": "SUSE Security Advisory vom 2022-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010255.html"
},
{
"category": "external",
"summary": "SUSE Security Advisory vom 2022-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010257.html"
},
{
"category": "external",
"summary": "SUSE Security Advisory vom 2022-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010259.html"
},
{
"category": "external",
"summary": "SUSE Security Advisory vom 2022-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010260.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2022-0C6402A6A3 vom 2022-03-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2022-0c6402a6a3"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2022-0649006BE6 vom 2022-03-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2022-0649006be6"
}
],
"source_lang": "en-US",
"title": "cobbler: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-11-14T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:01:41.196+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2926",
"initial_release_date": "2022-02-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-02-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-03-03T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-11-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source cobbler \u003c 3.3.1",
"product": {
"name": "Open Source cobbler \u003c 3.3.1",
"product_id": "T022120",
"product_identification_helper": {
"cpe": "cpe:/a:cobbler:cobbler:3.3.1"
}
}
},
{
"category": "product_name",
"name": "Open Source cobbler \u003c= 3.3.1",
"product": {
"name": "Open Source cobbler \u003c= 3.3.1",
"product_id": "T022121",
"product_identification_helper": {
"cpe": "cpe:/a:cobbler:cobbler:3.3.1"
}
}
}
],
"category": "product_name",
"name": "cobbler"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-45081",
"notes": [
{
"category": "description",
"text": "In cobbler existieren mehrere Schwachstellen. Die Fehler bestehen darin, dass die Funktion check_for_invalid_imports es dem Cheetah-Code erm\u00f6glichen kann, Python-Module \u00fcber die Teilzeichenkette \"#from MODULE import\" in der Datei templar.py zu importieren, die Dateien in /etc/cobbler weltweit lesbar sind und die Routinen in mehreren Dateien das HTTP-Protokoll anstelle des sichereren HTTPS verwenden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T000126"
],
"last_affected": [
"T022121"
]
},
"release_date": "2022-02-20T23:00:00.000+00:00",
"title": "CVE-2021-45081"
},
{
"cve": "CVE-2021-45082",
"notes": [
{
"category": "description",
"text": "In cobbler existieren mehrere Schwachstellen. Die Fehler bestehen darin, dass die Funktion check_for_invalid_imports es dem Cheetah-Code erm\u00f6glichen kann, Python-Module \u00fcber die Teilzeichenkette \"#from MODULE import\" in der Datei templar.py zu importieren, die Dateien in /etc/cobbler weltweit lesbar sind und die Routinen in mehreren Dateien das HTTP-Protokoll anstelle des sichereren HTTPS verwenden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T000126"
],
"last_affected": [
"T022121"
]
},
"release_date": "2022-02-20T23:00:00.000+00:00",
"title": "CVE-2021-45082"
},
{
"cve": "CVE-2021-45083",
"notes": [
{
"category": "description",
"text": "In cobbler existieren mehrere Schwachstellen. Die Fehler bestehen darin, dass die Funktion check_for_invalid_imports es dem Cheetah-Code erm\u00f6glichen kann, Python-Module \u00fcber die Teilzeichenkette \"#from MODULE import\" in der Datei templar.py zu importieren, die Dateien in /etc/cobbler weltweit lesbar sind und die Routinen in mehreren Dateien das HTTP-Protokoll anstelle des sichereren HTTPS verwenden. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T000126"
],
"last_affected": [
"T022121"
]
},
"release_date": "2022-02-20T23:00:00.000+00:00",
"title": "CVE-2021-45083"
}
]
}
GHSA-5946-MPW5-PQXX
Vulnerability from github – Published: 2022-02-21 00:00 – Updated: 2024-09-13 18:30An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "cobbler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-45083"
],
"database_specific": {
"cwe_ids": [
"CWE-276"
],
"github_reviewed": true,
"github_reviewed_at": "2022-03-08T18:49:35Z",
"nvd_published_at": "2022-02-20T18:15:00Z",
"severity": "HIGH"
},
"details": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"id": "GHSA-5946-mpw5-pqxx",
"modified": "2024-09-13T18:30:44Z",
"published": "2022-02-21T00:00:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45083"
},
{
"type": "WEB",
"url": "https://github.com/cobbler/cobbler/pull/2945"
},
{
"type": "WEB",
"url": "https://github.com/cobbler/cobbler/commit/10b2112db83fedfc391e900edfedc2b4e507d3f7"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-5946-mpw5-pqxx"
},
{
"type": "PACKAGE",
"url": "https://github.com/cobbler/cobbler"
},
{
"type": "WEB",
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"type": "WEB",
"url": "https://github.com/cobbler/cobbler/releases/tag/v3.3.1"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/cobbler/PYSEC-2022-38.yaml"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Incorrect Default Permissions in Cobbler"
}
CNVD-2022-18325
Vulnerability from cnvd - Published: 2022-03-11厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/cobbler/cobbler/releases
| Name | Cobbler Cobbler <3.3.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-45083",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-45083"
}
},
"description": "Cobbler\u662f\u4e00\u6b3e\u7f51\u7edc\u5b89\u88c5\u670d\u52a1\u5668\u5957\u4ef6\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u5feb\u901f\u5efa\u7acbLinux\u7f51\u7edc\u5b89\u88c5\u73af\u5883\u3002\n\nCobbler 3.3.1\u4e4b\u524d\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e/etc/cobbler\u4e2d\u7684\u6587\u4ef6\u662f\u516c\u5f00\u53ef\u8bfb\u7684\uff0c\u5176\u4e2d\u4e24\u4e2a\u6587\u4ef6\u5305\u542b\u4e00\u4e9b\u654f\u611f\u4fe1\u606f\uff0c\u8fd9\u4e9b\u4fe1\u606f\u53ef\u80fd\u4f1a\u66b4\u9732\u7ed9\u5bf9\u670d\u52a1\u5668\u5177\u6709\u975e\u7279\u6743\u8bbf\u95ee\u6743\u9650\u7684\u672c\u5730\u7528\u6237\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/cobbler/cobbler/releases",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-18325",
"openTime": "2022-03-11",
"patchDescription": "Cobbler\u662f\u4e00\u6b3e\u7f51\u7edc\u5b89\u88c5\u670d\u52a1\u5668\u5957\u4ef6\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u5feb\u901f\u5efa\u7acbLinux\u7f51\u7edc\u5b89\u88c5\u73af\u5883\u3002\r\n\r\nCobbler 3.3.1\u4e4b\u524d\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e/etc/cobbler\u4e2d\u7684\u6587\u4ef6\u662f\u516c\u5f00\u53ef\u8bfb\u7684\uff0c\u5176\u4e2d\u4e24\u4e2a\u6587\u4ef6\u5305\u542b\u4e00\u4e9b\u654f\u611f\u4fe1\u606f\uff0c\u8fd9\u4e9b\u4fe1\u606f\u53ef\u80fd\u4f1a\u66b4\u9732\u7ed9\u5bf9\u670d\u52a1\u5668\u5177\u6709\u975e\u7279\u6743\u8bbf\u95ee\u6743\u9650\u7684\u672c\u5730\u7528\u6237\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cobbler\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2022-18325\uff09\u7684\u8865\u4e01",
"products": {
"product": "Cobbler Cobbler \u003c3.3.1"
},
"referenceLink": "https://github.com/cobbler/cobbler/releases",
"serverity": "\u4f4e",
"submitTime": "2022-02-22",
"title": "Cobbler\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2022-18325\uff09"
}
GSD-2021-45083
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-45083",
"description": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"id": "GSD-2021-45083",
"references": [
"https://www.suse.com/security/cve/CVE-2021-45083.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-45083"
],
"details": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.",
"id": "GSD-2021-45083",
"modified": "2023-12-13T01:23:19.911258Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-45083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cobbler/cobbler/releases",
"refsource": "MISC",
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"name": "https://www.openwall.com/lists/oss-security/2022/02/18/3",
"refsource": "MISC",
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193671",
"refsource": "MISC",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"name": "FEDORA-2022-0c6402a6a3",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"name": "FEDORA-2022-0649006be6",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"name": "FEDORA-2022-f1510aa454",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c3.3.1",
"affected_versions": "All versions before 3.3.1",
"cvss_v2": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-276",
"CWE-937"
],
"date": "2022-03-08",
"description": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The `users.digest` file contains the `sha2-512` digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The `settings.yaml` file contains secrets such as the hashed default password.",
"fixed_versions": [
"3.3.1"
],
"identifier": "CVE-2021-45083",
"identifiers": [
"GHSA-5946-mpw5-pqxx",
"CVE-2021-45083"
],
"not_impacted": "All versions starting from 3.3.1",
"package_slug": "pypi/Cobbler",
"pubdate": "2022-02-21",
"solution": "Upgrade to version 3.3.1 or above.",
"title": "Incorrect Default Permissions",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-45083",
"https://github.com/cobbler/cobbler/releases",
"https://www.openwall.com/lists/oss-security/2022/02/18/3",
"https://bugzilla.suse.com/show_bug.cgi?id=1193671",
"https://github.com/cobbler/cobbler/pull/2945",
"https://github.com/cobbler/cobbler/releases/tag/v3.3.1",
"https://github.com/advisories/GHSA-5946-mpw5-pqxx"
],
"uuid": "dcbc1ef0-818b-4eb1-9fe0-f5ec414cd018"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-45083"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it\u0027s trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/cobbler/cobbler/releases",
"refsource": "MISC",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cobbler/cobbler/releases"
},
{
"name": "https://www.openwall.com/lists/oss-security/2022/02/18/3",
"refsource": "MISC",
"tags": [
"Mailing List",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2022/02/18/3"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193671",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"name": "FEDORA-2022-0649006be6",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
},
{
"name": "FEDORA-2022-0c6402a6a3",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"name": "FEDORA-2022-f1510aa454",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
},
"lastModifiedDate": "2022-04-12T18:23Z",
"publishedDate": "2022-02-20T18:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.