Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hpj3-5p46-g87w

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Cobbler vulnerable to code injection via unsafe YAML loading

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

Пакеты

Наименование

cobbler

pip
Затронутые версииВерсия исправления

< 2.6.0

2.6.0

EPSS

Процентиль: 72%
0.00706
Низкий

Дефекты

CWE-20
CWE-94

Связанные уязвимости

ubuntu
больше 11 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

redhat
больше 14 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

nvd
больше 11 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

debian
больше 11 лет назад

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 al ...

suse-cvrf
около 5 лет назад

Security update for cobbler

EPSS

Процентиль: 72%
0.00706
Низкий

Дефекты

CWE-20
CWE-94