Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4953

Опубликовано: 27 окт. 2014
Источник: debian

Описание

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cobblernot-affectedpackage

Связанные уязвимости

ubuntu
больше 11 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

redhat
больше 14 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

nvd
больше 11 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

github
больше 3 лет назад

Cobbler vulnerable to code injection via unsafe YAML loading

suse-cvrf
около 5 лет назад

Security update for cobbler