Unrated severityNVD Advisory· Published Jul 31, 2024· Updated Jul 31, 2024
FOG Weak file permissions
CVE-2024-41954
Description
FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
Affected products
1- Range: < 1.5.10.41
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90mitrex_refsource_MISC
- github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282cmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.