5 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Incomplete blacklist vulnerability in action_power.py in Cobbler 2.2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API. Vulnerabilidad de lista negra incompleta en action_power.py de Cobbler 2.2.0. Permite a atacantes remotos ejecutar comandos arbitrarios a través de meta-caracteres de shell en los campos (1) username o (2) password del método power_system method del API xmlrpc. • http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00000.html http://www.openwall.com/lists/oss-security/2012/05/23/18 http://www.openwall.com/lists/oss-security/2012/05/23/4 http://www.osvdb.org/82458 http://www.securityfocus.com/bid/53666 https://bugs.launchpad.net/ubuntu/+source/cobbler/+bug/978999 https://github.com/cobbler/cobbler/commit/6d9167e5da44eca56bdf42b5776097a6779aaadf https://gi • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 80EXPL: 0

Cobbler before 2.0.4 uses an incorrect umask value, which allows local users to have an unspecified impact by leveraging world writable permissions for files and directories. Cobbler en versiones anteriores a la 2.0.4 usa un valor de umask incorrecto, lo que permite a usuarios locales tener un impacto no especificado aprovechando permisos de escritura para todos en ficheros y directorios. • http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz http://secunia.com/advisories/42602 https://bugzilla.redhat.com/show_bug.cgi?id=554567 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 59EXPL: 0

Cobbler before 1.6.1 does not properly determine whether an installation has the default password, which makes it easier for attackers to obtain access by using this password. Cobbler, en versiones anteriores a la 1.6.1, no determina de manera apropiada si una instalación tiene la contraseña por defecto, lo que facilita a los atacantes obtener acceso usando esta contraseña. • http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz https://exchange.xforce.ibmcloud.com/vulnerabilities/64734 • CWE-255: Credentials Management Errors •

CVSS: 8.5EPSS: 0%CPEs: 82EXPL: 0

template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954. template_api.py en Cobbler, en versiones anteriores a la 2.0.7, como es usado en Red Hat Network Satellite Server y otros productos, no deshabilita la posiblidad del motor de plantillas Cheetah de ejecutar declaraciones Python contenidas en plantillas, lo que permite a administradores remotos autenticados ejecutar código de su elección mediante un fichero de plantilla kickstart manipulado, una vulnerabilidad diferente a CVE-2008-6954. • http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz http://www.redhat.com/support/errata/RHSA-2010-0775.html https://bugzilla.redhat.com/show_bug.cgi?id=607662 https://access.redhat.com/security/cve/CVE-2010-2235 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-96: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') •

CVSS: 9.0EPSS: 0%CPEs: 42EXPL: 0

The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules. La interfaz web en Cobbler (CobblerWeb) anterior a v1.29, permite a usuarios autenticados remotamente ejecutar código Python de su elección en cobblerd, mediante la edición de la plantilla "Cheetah kickstart" a los módulos "import Python" arbitrarios. • http://freshmeat.net/projects/cobbler/releases/288374 http://osvdb.org/50291 http://secunia.com/advisories/32737 http://secunia.com/advisories/32804 http://www.securityfocus.com/bid/32317 https://exchange.xforce.ibmcloud.com/vulnerabilities/46625 https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00462.html https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00485.html • CWE-264: Permissions, Privileges, and Access Controls •