Michael Dehaan

Cobbler

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.87%
  • Veröffentlicht 16.06.2012 00:55:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Incomplete blacklist vulnerability in action_power.py in Cobbler 2.2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API.

  • EPSS 0.12%
  • Veröffentlicht 09.12.2010 20:00:18
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cobbler before 2.0.4 uses an incorrect umask value, which allows local users to have an unspecified impact by leveraging world writable permissions for files and directories.

  • EPSS 1.84%
  • Veröffentlicht 09.12.2010 20:00:17
  • Zuletzt bearbeitet 11.04.2025 00:51:21

template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticate...

  • EPSS 0.3%
  • Veröffentlicht 09.12.2010 20:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cobbler before 1.6.1 does not properly determine whether an installation has the default password, which makes it easier for attackers to obtain access by using this password.

  • EPSS 1.64%
  • Veröffentlicht 12.08.2009 10:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.