Moderate severityNVD Advisory· Published May 14, 2014· Updated May 6, 2026
CVE-2014-3225
CVE-2014-3225
Description
Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cobblerPyPI | >= 2.6.0, < 2.6.4 | 2.6.4 |
cobblerPyPI | >= 2.4.0, < 2.4.7 | 2.4.7 |
Patches
28232c0e88ec7Add strict kickstart check in the API, again should fix #939.
1 file changed · +5 −1
cobbler/remote.py+5 −1 modified@@ -823,7 +823,11 @@ def modify_item(self,what,object_id,attribute,arg,token): # support 1.6 field name exceptions for backwards compat attribute = REMAP_COMPAT.get(attribute,attribute) method = obj.remote_methods().get(attribute, None) - if method == None: + + if what == "system" and attribute == "kickstart": + self._validate_ks_template_path(arg) + + if method is None: # it's ok, the CLI will send over lots of junk we can't process # (like newname or in-place) so just go with it. return False
f757e3096fcdAdd strict kickstart check in the API, again should fix #939.
1 file changed · +5 −1
cobbler/remote.py+5 −1 modified@@ -823,7 +823,11 @@ def modify_item(self,what,object_id,attribute,arg,token): # support 1.6 field name exceptions for backwards compat attribute = REMAP_COMPAT.get(attribute,attribute) method = obj.remote_methods().get(attribute, None) - if method == None: + + if what == "system" and attribute == "kickstart": + self._validate_ks_template_path(arg) + + if method is None: # it's ok, the CLI will send over lots of junk we can't process # (like newname or in-place) so just go with it. return False
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
13- packetstormsecurity.com/files/126553/Cobbler-Local-File-Inclusion.htmlnvdExploitWEB
- www.exploit-db.com/exploits/33252nvdExploitWEB
- www.youtube.com/watchnvdExploitWEB
- github.com/advisories/GHSA-xc7w-jvhx-p6q9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-3225ghsaADVISORY
- seclists.org/oss-sec/2014/q2/273nvdWEB
- seclists.org/oss-sec/2014/q2/274nvdWEB
- www.osvdb.org/106759nvdWEB
- www.securityfocus.com/archive/1/532094/100/0/threadednvdWEB
- www.securityfocus.com/bid/67277nvdWEB
- github.com/cobbler/cobbler/commit/8232c0e88ec7382d3f8d3bf48c81a4a91ac4325dghsaWEB
- github.com/cobbler/cobbler/commit/f757e3096fcd32397609ca38efb01f19d16dd634ghsaWEB
- github.com/cobbler/cobbler/issues/939nvdWEB
News mentions
0No linked articles in our index yet.