Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-40323

Опубликовано: 20 сент. 2021
Источник: redhat
CVSS3: 9.1
EPSS Критический

Описание

Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

A flaw was found in cobbler. This flaw lies in the generate_script RPC method, which accepts unsanitized parameters. This flaw allows an attacker to read arbitrary files on the system as root. Further, the attacker could gain arbitrary code execution using template injection against the default Cheetah template engine, leading to the exposure of sensitive information or execution of arbitrary code. The highest threat from this vulnerability is to confidentiality and integrity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8rhn-tools:1.0/cobblerNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2006840cobbler: Arbitrary File Disclosure/Template Injection via generate_script RPC method

EPSS

Процентиль: 100%
0.93171
Критический

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 4 лет назад

Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

CVSS3: 9.8
nvd
больше 4 лет назад

Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

CVSS3: 9.8
debian
больше 4 лет назад

Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code E ...

CVSS3: 9.8
github
больше 4 лет назад

Cobbler before 3.3.0 allows log poisoning

EPSS

Процентиль: 100%
0.93171
Критический

9.1 Critical

CVSS3