CVE-2021-40323
openSUSE Security Advisory - openSUSE-SU-2022:0062-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
Cobbler versiones anteriores a 3.3.0, permite un envenenamiento de registros, y la resultante Ejecución de Código Remota , por medio de un método XMLRPC que se registra en el archivo de registro para la inyección de plantillas
An update that solves 6 vulnerabilities and has 6 fixes is now available. This update for cobbler fixes the following issues. Fixed unsafe permissions on sensitive files. Fixed incomplete template sanitation. Fixed Remote Code Execution in the XMLRPC API which additionally allowed arbitrary file read and write as root. The following non-security bugs were fixed. Boot_loader is not set destination directory is not existing.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-30 CVE Reserved
- 2021-10-04 CVE Published
- 2024-08-04 CVE Updated
- 2025-05-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/cobbler/cobbler/releases/tag/v3.3.0 | Product |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a | 2021-10-12 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cobbler Project Search vendor "Cobbler Project" | Cobbler Search vendor "Cobbler Project" for product "Cobbler" | <= 3.3.0 Search vendor "Cobbler Project" for product "Cobbler" and version " <= 3.3.0" | - |
Affected
|