Safety vulnerability ID: 45317
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Cobbler 3.3.1 includes a fix for CVE-2021-45083: Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
Latest version: 3.3.7
Network Boot and Update Server
An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.) See CVE-2021-45082.
MISC:https://bugzilla.suse.com/show_bug.cgi?id=1193678: https://bugzilla.suse.com/show_bug.cgi?id=1193678
MISC:https://github.com/cobbler/cobbler/releases: https://github.com/cobbler/cobbler/releases
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application