First published: Mon Aug 20 2018(Updated: )
Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/cobbler | <=2.6.11 | 3.0.0 |
Cobbler | >=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000226 has been classified with a high severity due to its potential for privilege escalation and data manipulation.
To mitigate CVE-2018-1000226, upgrade to Cobbler version 3.0.0 or later.
CVE-2018-1000226 affects Cobbler versions 2.0.0 up to 2.6.11.
CVE-2018-1000226 is an Incorrect Access Control vulnerability found in the XMLRPC API.
Exploiting CVE-2018-1000226 can lead to privilege escalation and unauthorized data manipulation.