suse-su-2018:2608-1
Vulnerability from csaf_suse
Published
2018-09-04 13:49
Modified
2018-09-04 13:49
Summary
Security update for cobbler
Notes
Title of the patch
Security update for cobbler
Description of the patch
This update for cobbler fixes the following issues:
Security issues fixed:
- Forbid exposure of private methods in the API (CVE-2018-10931,
CVE-2018-1000225, bsc#1104287, bsc#1104189, bsc#1105442)
- Check access token when calling 'modify_setting' API endpoint
(bsc#1104190, bsc#1105440, CVE-2018-1000226)
Other bugs fixed:
- Fix kernel options when generating bootiso (bsc#1101670)
Patchnames
SUSE-SUSE-Manager-Server-3.1-2018-1832
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for cobbler", "title": "Title of the patch" }, { "category": "description", "text": "This update for cobbler fixes the following issues:\n\nSecurity issues fixed:\n\n- Forbid exposure of private methods in the API (CVE-2018-10931,\n CVE-2018-1000225, bsc#1104287, bsc#1104189, bsc#1105442)\n- Check access token when calling \u0027modify_setting\u0027 API endpoint\n (bsc#1104190, bsc#1105440, CVE-2018-1000226)\n\nOther bugs fixed:\n\n- Fix kernel options when generating bootiso (bsc#1101670)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SUSE-Manager-Server-3.1-2018-1832", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2608-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2608-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182608-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2608-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004531.html" }, { "category": "self", "summary": "SUSE Bug 1101670", "url": "https://bugzilla.suse.com/1101670" }, { "category": "self", "summary": "SUSE Bug 1104189", "url": "https://bugzilla.suse.com/1104189" }, { "category": "self", "summary": "SUSE Bug 1104190", "url": "https://bugzilla.suse.com/1104190" }, { "category": "self", "summary": "SUSE Bug 1104287", "url": "https://bugzilla.suse.com/1104287" }, { "category": "self", "summary": "SUSE Bug 1105440", "url": "https://bugzilla.suse.com/1105440" }, { "category": "self", "summary": "SUSE Bug 1105442", "url": "https://bugzilla.suse.com/1105442" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000225 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000225/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000226 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000226/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10931 page", "url": "https://www.suse.com/security/cve/CVE-2018-10931/" } ], "title": "Security update for cobbler", "tracking": { "current_release_date": "2018-09-04T13:49:25Z", "generator": { "date": "2018-09-04T13:49:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2608-1", "initial_release_date": "2018-09-04T13:49:25Z", "revision_history": [ { "date": "2018-09-04T13:49:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cobbler-2.6.6-5.17.1.noarch", "product": { "name": "cobbler-2.6.6-5.17.1.noarch", "product_id": "cobbler-2.6.6-5.17.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Server 3.1", "product": { "name": "SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:3.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cobbler-2.6.6-5.17.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" }, "product_reference": "cobbler-2.6.6-5.17.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000225" } ], "notes": [ { "category": "general", "text": "Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. This attack appear to be exploitable via \"network connectivity\". Sending unauthenticated JavaScript payload to the Cobbler XMLRPC API (/cobbler_api).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000225", "url": "https://www.suse.com/security/cve/CVE-2018-1000225" }, { "category": "external", "summary": "SUSE Bug 1104190 for CVE-2018-1000225", "url": "https://bugzilla.suse.com/1104190" }, { "category": "external", "summary": "SUSE Bug 1104287 for CVE-2018-1000225", "url": "https://bugzilla.suse.com/1104287" }, { "category": "external", "summary": "SUSE Bug 1105442 for CVE-2018-1000225", "url": "https://bugzilla.suse.com/1105442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-04T13:49:25Z", "details": "critical" } ], "title": "CVE-2018-1000225" }, { "cve": "CVE-2018-1000226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000226" } ], "notes": [ { "category": "general", "text": "Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via \"network connectivity\". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000226", "url": "https://www.suse.com/security/cve/CVE-2018-1000226" }, { "category": "external", "summary": "SUSE Bug 1104190 for CVE-2018-1000226", "url": "https://bugzilla.suse.com/1104190" }, { "category": "external", "summary": "SUSE Bug 1104287 for CVE-2018-1000226", "url": "https://bugzilla.suse.com/1104287" }, { "category": "external", "summary": "SUSE Bug 1105440 for CVE-2018-1000226", "url": "https://bugzilla.suse.com/1105440" }, { "category": "external", "summary": "SUSE Bug 1105442 for CVE-2018-1000226", "url": "https://bugzilla.suse.com/1105442" }, { "category": "external", "summary": "SUSE Bug 1131852 for CVE-2018-1000226", "url": "https://bugzilla.suse.com/1131852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-04T13:49:25Z", "details": "important" } ], "title": "CVE-2018-1000226" }, { "cve": "CVE-2018-10931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10931" } ], "notes": [ { "category": "general", "text": "It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10931", "url": "https://www.suse.com/security/cve/CVE-2018-10931" }, { "category": "external", "summary": "SUSE Bug 1104189 for CVE-2018-10931", "url": "https://bugzilla.suse.com/1104189" }, { "category": "external", "summary": "SUSE Bug 1104190 for CVE-2018-10931", "url": "https://bugzilla.suse.com/1104190" }, { "category": "external", "summary": "SUSE Bug 1104287 for CVE-2018-10931", "url": "https://bugzilla.suse.com/1104287" }, { "category": "external", "summary": "SUSE Bug 1105440 for CVE-2018-10931", "url": "https://bugzilla.suse.com/1105440" }, { "category": "external", "summary": "SUSE Bug 1105442 for CVE-2018-10931", "url": "https://bugzilla.suse.com/1105442" }, { "category": "external", "summary": "SUSE Bug 1130105 for CVE-2018-10931", "url": "https://bugzilla.suse.com/1130105" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.17.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-09-04T13:49:25Z", "details": "critical" } ], "title": "CVE-2018-10931" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…