fkie_cve-2008-6954
Vulnerability from fkie_nvd
Published
2009-08-12 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2918B32-247E-482A-B0A7-4FAE6D6D6DFC", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "7FFB6CA1-8DE6-46A2-B651-9185B5C3F2A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F56967E4-ED40-41BF-9C91-7954A010AF63", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2572B0E1-B53E-4321-AEFF-9693BDB4BDEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E6FA453-E023-4F97-A8D8-AF237E380388", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "627B0E5A-ADCC-42BD-BB59-AEF9E644DACE", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B59B8107-434B-4840-AC71-7F8C5B49DAB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "5D040E2B-7C70-4472-BC3D-05E3A3ED3737", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "9E9F8A0A-64A8-485D-A9D7-D7AC21DFF72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F63C6E4-14DD-4478-8BAA-339AD0ACCD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "04B41068-0E9E-4E07-BB13-F36DAEE72FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E229C4C-B695-4206-ACBB-F5CC650839B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "853B8AF2-A457-4B55-BF75-DB9D8DE223B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "1AC609A3-8BEC-434D-B54D-35C37D1D1F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "084D307A-8D04-4CA6-8578-671DEE947F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6FCE8A70-8380-4B3D-B21B-5DC4DE89BA44", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DEFF3158-173F-49A7-83A7-A81B4FC01415", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0619FD9-7B6D-4DCB-ABFF-F88836929A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE6AEA-64C4-4C14-B86B-3C23DCA1681D", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "D1E8A8A7-2C7F-4472-8325-F084422EF292", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "309F7F4F-FDA3-4DDB-ADC9-3B3FBCB1EC4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "36D63C65-AB90-4333-B65A-01E8169B5949", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "841920B9-7D97-4307-B26B-A4CC8719D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "CDB39A4A-3E43-4136-81CD-B60794EC404E", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "07589167-C139-41FF-903E-9368C614F782", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "63A5A98D-B58F-49BD-B592-ADF7C24B2914", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6422638-6A04-4C78-A2EE-A2EF306EC437", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "9BF19E29-9CA7-4020-9493-37F1303D1872", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "370D7F49-D17C-4E15-B32E-EB70B7132073", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "44F6519E-D036-4C98-A801-0C7BFAD5D83A", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "34821A36-4C63-40BA-B45F-0C7B6B6D2455", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "96CA84D7-1B4B-4C07-8743-9D1B291A9EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E173676-83B1-44FE-9739-CA46FDE94944", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F114D84-0D39-47B1-B337-A2616E672346", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDEAC9-E8AC-4597-A584-A5989F11BE04", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*", "matchCriteriaId": "CB865F95-A38D-4A67-8219-AA74946F4571", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "90C6F857-41DD-46E4-9D58-DF95EF2D0711", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1347D094-2161-4FAA-9208-4EAB6E6E5A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5ED95EDC-D6A6-4011-908E-E9540B708651", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6C225ECD-81C9-45CF-AAD2-51C1093DCBA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FC4E3814-CC61-4777-8560-BD942EECED66", "vulnerable": true }, { "criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "392DF7EC-212D-4EF1-ABE8-72FC4A3788AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules." }, { "lang": "es", "value": "La interfaz web en Cobbler (CobblerWeb) anterior a v1.29, permite a usuarios autenticados remotamente ejecutar c\u00f3digo Python de su elecci\u00f3n en cobblerd, mediante la edici\u00f3n de la plantilla \"Cheetah kickstart\" a los m\u00f3dulos \"import Python\" arbitrarios." } ], "id": "CVE-2008-6954", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-12T10:30:00.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://freshmeat.net/projects/cobbler/releases/288374" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/50291" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32737" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32804" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32317" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46625" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00462.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://freshmeat.net/projects/cobbler/releases/288374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00462.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00485.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…