3.6
CVSSv2

CVE-2021-45083

Published: 20/02/2022 Updated: 07/11/2023
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

An issue exists in Cobbler prior to 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cobbler project cobbler

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

An issue was discovered in Cobbler before 331 Files in /etc/cobbler are world readable Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server The usersdigest file contains the sha2-512 digest of users in a Cobbler local installation In the case of an easy-to-guess ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities affecting cobbler <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Paolo Perego &lt;ppere ...