Cobbler Project Cobbler vulnerabilities

19 known vulnerabilities affecting cobbler_project/cobbler.

Total CVEs
19
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL7HIGH7MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2024-47533CRITICALPoC≥ 3.3.0, < 3.3.7≥ 3.0.0, < 3.2.32024-11-18
CVE-2024-47533 [CRITICAL] CWE-287 cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes ### Summary utils.get_shared_secret() always returns -1 - allows anyone to connect to cobbler XML-RPC as user '' password -1 and make any changes. ### Details utils.py get_shared_secret: ``` def get_shared_secret() -> Union[str, int]: """ The 'web.ss' file is regenerated
ghsaosv
CVE-2010-2235CRITICALCVSS 9.0≥ 0, < 2.0.72022-05-17
CVE-2010-2235 [CRITICAL] CWE-94 Cobbler is vulnerable to code injection Cobbler is vulnerable to code injection template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954.
ghsaosv
CVE-2012-2395HIGHCVSS 7.5≥ 0, < 2.6.02022-05-17
CVE-2012-2395 [HIGH] CWE-77 Cobbler subject to Command Injection Cobbler subject to Command Injection A Command Injection in action_power.py in Cobbler prior to v2.6.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API.
ghsaosv
CVE-2008-6954HIGH≥ 0, < 1.2.92022-05-17
CVE-2008-6954 [HIGH] CWE-94 Cobbler Web Interface Kickstart Template Remote Privilege Escalation Vulnerability Cobbler Web Interface Kickstart Template Remote Privilege Escalation Vulnerability The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code with the root privileges in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.
ghsaosv
CVE-2014-3225MEDIUMCVSS 4.0PoC≥ 2.6.0, < 2.6.4≥ 2.4.0, < 2.4.72022-05-14
CVE-2014-3225 [MEDIUM] CWE-22 Cobbler Path Traversal vulnerability Cobbler Path Traversal vulnerability Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile.
ghsaosv
CVE-2018-1000225MEDIUMCVSS 6.1≥ 0, ≤ 2.6.112022-05-14
CVE-2018-1000225 [MEDIUM] CWE-79 Cobbler XSS Vulnerability Cobbler XSS Vulnerability Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. This attack appear to be exploitable via "network connectivity". Sending unauthenticated JavaScript payload to the Cobbler XMLRPC API (/
ghsaosv
CVE-2018-1000226CRITICALCVSS 9.8PoC≥ 0, < 3.0.02022-05-13
CVE-2018-1000226 [CRITICAL] CWE-732 Cobbler Improper Validation of Security Tokens Cobbler Improper Validation of Security Tokens Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be e
ghsaosv
CVE-2011-4952HIGH≥ 0, < 2.6.02022-04-22
CVE-2011-4952 [HIGH] CWE-352 Cobbler Web Interface Lacks CSRF Protection Cobbler Web Interface Lacks CSRF Protection cobbler: Web interface lacks CSRF protection when using Django framework
ghsaosv
CVE-2022-0860CRITICALCVSS 9.1fixed in 3.3.22022-03-11
CVE-2022-0860 [CRITICAL] CWE-285 CVE-2022-0860: Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2. Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.
ghsanvdosv
CVE-2021-45083HIGHCVSS 7.1fixed in 3.3.12022-02-20
CVE-2021-45083 [HIGH] CWE-276 CVE-2021-45083: An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of th An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess pa
ghsanvdosv
CVE-2021-45081MEDIUMCVSS 5.9≤ 3.3.12022-02-20
CVE-2021-45081 [MEDIUM] CWE-319 CVE-2021-45081: An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol in An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol instead of the more secure HTTPS.
nvd
CVE-2021-45082HIGHCVSS 7.8fixed in 3.3.12022-02-19
CVE-2021-45082 [HIGH] CWE-77 CVE-2021-45082: An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_inva An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)
ghsanvdosv
CVE-2021-40323CRITICALCVSS 9.8PoC≤ 3.3.02021-10-04
CVE-2021-40323 [CRITICAL] CWE-94 CVE-2021-40323: Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
ghsanvdosv
CVE-2021-40325HIGHCVSS 7.5≤ 3.3.02021-10-04
CVE-2021-40325 [HIGH] CVE-2021-40325: Cobbler before 3.3.0 allows authorization bypass for modification of settings. Cobbler before 3.3.0 allows authorization bypass for modification of settings.
ghsanvdosv
CVE-2021-40324HIGHCVSS 7.5≤ 3.3.02021-10-04
CVE-2021-40324 [HIGH] CWE-434 CVE-2021-40324: Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
ghsanvdosv
CVE-2016-9605MEDIUMCVSS 6.1v2.6.11-12018-08-22
CVE-2016-9605 [MEDIUM] CWE-79 CVE-2016-9605: A flaw was found in cobbler software component version 2.6.11-1. It suffers from an invalid paramete A flaw was found in cobbler software component version 2.6.11-1. It suffers from an invalid parameter validation vulnerability, leading the arbitrary file reading. The flaw is triggered by navigating to a vulnerable URL via cobbler-web on a default installation.
ghsanvdosv
CVE-2018-10931CRITICALCVSS 9.8≥ 2.6.0, ≤ 2.6.112018-08-09
CVE-2018-10931 [CRITICAL] CWE-749 CVE-2018-10931: It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XML It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
ghsanvdosv
CVE-2017-1000469CRITICALCVSS 9.8≤ 2.8.22018-01-03
CVE-2017-1000469 [CRITICAL] CWE-20 CVE-2017-1000469: Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" com Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user.
ghsanvdosv
CVE-2011-4953MEDIUMCVSS 6.8≤ 2.2.12014-10-27
CVE-2011-4953 [MEDIUM] CWE-20 CVE-2011-4953: The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attacke The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.
ghsanvdosv