VYPR
Moderate severityNVD Advisory· Published Aug 22, 2018· Updated Aug 6, 2024

CVE-2016-9605

CVE-2016-9605

Description

A flaw was found in cobbler software component version 2.6.11-1. It suffers from an invalid parameter validation vulnerability, leading the arbitrary file reading. The flaw is triggered by navigating to a vulnerable URL via cobbler-web on a default installation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cobbler 2.6.11-1 fails to validate the 'script' parameter, allowing an attacker to read arbitrary files through directory traversal.

Vulnerability

The vulnerability resides in the Cobbler software component, specifically in the cobbler-web interface, version 2.6.11-1. The flaw is an invalid parameter validation vulnerability that leads to arbitrary file reading. This occurs via a crafted URL that includes a script parameter with directory traversal sequences (e.g., ../../../../../etc/passwd).

Exploitation

An attacker can exploit this vulnerability by navigating to a specially crafted URL on a default installation of Cobbler and cobbler-web. The URL pattern is: http://localhost/cblr/svc/profile/<valid_profile>/op/script?scriptx=script/script/script/script/script/script/script/script/&script=../../../../../etc/passwd. No authentication is mentioned as required; the attacker only needs network access to the Cobbler web interface [2].

Impact

Successful exploitation allows the attacker to read arbitrary files on the system, such as /etc/passwd, leading to information disclosure. The impact is limited to reading files, not writing or code execution, but sensitive data can be exposed [1][2].

Mitigation

As of the available references, no fix has been released for this specific version (2.6.11-1). Red Hat Satellite 5, which includes Cobbler, is in a support phase where this issue is not planned to be addressed [2]. Users are advised to restrict network access to the cobbler-web interface and monitor for any future updates from the project repository [3]. No workaround is explicitly provided.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
cobblerPyPI
<= 2.6.11-1

Affected products

6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.