CVE-2016-9605
Description
A flaw was found in cobbler software component version 2.6.11-1. It suffers from an invalid parameter validation vulnerability, leading the arbitrary file reading. The flaw is triggered by navigating to a vulnerable URL via cobbler-web on a default installation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cobbler 2.6.11-1 fails to validate the 'script' parameter, allowing an attacker to read arbitrary files through directory traversal.
Vulnerability
The vulnerability resides in the Cobbler software component, specifically in the cobbler-web interface, version 2.6.11-1. The flaw is an invalid parameter validation vulnerability that leads to arbitrary file reading. This occurs via a crafted URL that includes a script parameter with directory traversal sequences (e.g., ../../../../../etc/passwd).
Exploitation
An attacker can exploit this vulnerability by navigating to a specially crafted URL on a default installation of Cobbler and cobbler-web. The URL pattern is: http://localhost/cblr/svc/profile/<valid_profile>/op/script?scriptx=script/script/script/script/script/script/script/script/&script=../../../../../etc/passwd. No authentication is mentioned as required; the attacker only needs network access to the Cobbler web interface [2].
Impact
Successful exploitation allows the attacker to read arbitrary files on the system, such as /etc/passwd, leading to information disclosure. The impact is limited to reading files, not writing or code execution, but sensitive data can be exposed [1][2].
Mitigation
As of the available references, no fix has been released for this specific version (2.6.11-1). Red Hat Satellite 5, which includes Cobbler, is in a support phase where this issue is not planned to be addressed [2]. Users are advised to restrict network access to the cobbler-web interface and monitor for any future updates from the project repository [3]. No workaround is explicitly provided.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cobblerPyPI | <= 2.6.11-1 | — |
Affected products
6- ghsa-coords5 versionspkg:pypi/cobblerpkg:rpm/opensuse/cobbler&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/koan&distro=openSUSE%20Tumbleweedpkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Server%203.0
<= 2.6.11-1+ 4 more
- (no CPE)range: <= 2.6.11-1
- (no CPE)range: < 3.2.1.336+git.5639a3af-1.1
- (no CPE)range: < 3.0.1-1.2
- (no CPE)range: < 2.6.6-48.1
- (no CPE)range: < 2.6.6-48.1
- The cobbler Project/cobblerv5Range: 2.6.11-1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4vc9-4xpq-77vmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-9605ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgighsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.