PyPI package
cobbler
pkg:pypi/cobbler
Vulnerabilities (18)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-47533 | Cri | 9.8 | >= 3.3.0, < 3.3.7 | 3.3.7 | Nov 18, 2024 | Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyon | |
| CVE-2022-0860 | — | < 3.3.2 | 3.3.2 | Mar 11, 2022 | Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2. | ||
| CVE-2021-45083 | — | < 3.3.1 | 3.3.1 | Feb 20, 2022 | An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of | ||
| CVE-2021-45082 | — | < 3.3.1 | 3.3.1 | Feb 18, 2022 | An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.) | ||
| CVE-2021-40325 | — | < 3.3.0 | 3.3.0 | Oct 4, 2021 | Cobbler before 3.3.0 allows authorization bypass for modification of settings. | ||
| CVE-2021-40324 | — | < 3.3.0 | 3.3.0 | Oct 4, 2021 | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | ||
| CVE-2021-40323 | — | < 3.3.0 | 3.3.0 | Oct 4, 2021 | Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection. | ||
| CVE-2011-4952 | — | < 2.6.0 | 2.6.0 | Nov 19, 2019 | cobbler: Web interface lacks CSRF protection when using Django framework | ||
| CVE-2016-9605 | — | <= 2.6.11-1 | — | Aug 22, 2018 | A flaw was found in cobbler software component version 2.6.11-1. It suffers from an invalid parameter validation vulnerability, leading the arbitrary file reading. The flaw is triggered by navigating to a vulnerable URL via cobbler-web on a default installation. | ||
| CVE-2018-1000226 | — | < 3.0.0 | 3.0.0 | Aug 20, 2018 | Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, | ||
| CVE-2018-1000225 | — | <= 2.6.11 | — | Aug 20, 2018 | Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. Th | ||
| CVE-2018-10931 | — | >= 2.6.0, < 3.0.0 | 3.0.0 | Aug 9, 2018 | It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon. | ||
| CVE-2017-1000469 | — | < 3.0.0 | 3.0.0 | Jan 3, 2018 | Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user. | ||
| CVE-2011-4953 | — | < 2.6.0 | 2.6.0 | Oct 27, 2014 | The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet. | ||
| CVE-2014-3225 | — | >= 2.6.0, < 2.6.4 | 2.6.4 | May 14, 2014 | Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile. | ||
| CVE-2012-2395 | — | < 2.6.0 | 2.6.0 | Jun 16, 2012 | Incomplete blacklist vulnerability in action_power.py in Cobbler 2.2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API. | ||
| CVE-2010-2235 | — | < 2.0.7 | 2.0.7 | Dec 9, 2010 | template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute ar | ||
| CVE-2008-6954 | — | < 1.2.9 | 1.2.9 | Aug 12, 2009 | The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules. |
- affected >= 3.3.0, < 3.3.7fixed 3.3.7
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyon
- CVE-2022-0860Mar 11, 2022affected < 3.3.2fixed 3.3.2
Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.
- CVE-2021-45083Feb 20, 2022affected < 3.3.1fixed 3.3.1
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of
- CVE-2021-45082Feb 18, 2022affected < 3.3.1fixed 3.3.1
An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)
- CVE-2021-40325Oct 4, 2021affected < 3.3.0fixed 3.3.0
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
- CVE-2021-40324Oct 4, 2021affected < 3.3.0fixed 3.3.0
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
- CVE-2021-40323Oct 4, 2021affected < 3.3.0fixed 3.3.0
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
- CVE-2011-4952Nov 19, 2019affected < 2.6.0fixed 2.6.0
cobbler: Web interface lacks CSRF protection when using Django framework
- CVE-2016-9605Aug 22, 2018affected <= 2.6.11-1
A flaw was found in cobbler software component version 2.6.11-1. It suffers from an invalid parameter validation vulnerability, leading the arbitrary file reading. The flaw is triggered by navigating to a vulnerable URL via cobbler-web on a default installation.
- CVE-2018-1000226Aug 20, 2018affected < 3.0.0fixed 3.0.0
Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation,
- CVE-2018-1000225Aug 20, 2018affected <= 2.6.11
Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. Th
- CVE-2018-10931Aug 9, 2018affected >= 2.6.0, < 3.0.0fixed 3.0.0
It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
- CVE-2017-1000469Jan 3, 2018affected < 3.0.0fixed 3.0.0
Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user.
- CVE-2011-4953Oct 27, 2014affected < 2.6.0fixed 2.6.0
The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.
- CVE-2014-3225May 14, 2014affected >= 2.6.0, < 2.6.4fixed 2.6.4
Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile.
- CVE-2012-2395Jun 16, 2012affected < 2.6.0fixed 2.6.0
Incomplete blacklist vulnerability in action_power.py in Cobbler 2.2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API.
- CVE-2010-2235Dec 9, 2010affected < 2.0.7fixed 2.0.7
template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute ar
- CVE-2008-6954Aug 12, 2009affected < 1.2.9fixed 1.2.9
The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.