Arbitrary Code Execution Affecting cobbler package, versions [,3.2.2)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
4.55% (93rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-COBBLER-1657875
- published 23 Sep 2021
- disclosed 20 Sep 2021
- credit Nicolas Chatelain
Introduced: 20 Sep 2021
CVE-2021-40323 Open this link in a new tabHow to fix?
Upgrade cobbler
to version 3.2.2 or higher.
Overview
cobbler is a network install server.
Affected versions of this package are vulnerable to Arbitrary Code Execution the generate_script
RPC method could be used to get arbitrary files on the system.
As many cobbler
endpoints call the _log
method, an attacker could call an endpoint of choice, insert malicious code into the log file via a crafted input, and use the generate_script
method to evaluate the associated log file as a template, thereby achieving arbitrary code execution.
CVSS Scores
version 3.1