First published: Sun Feb 20 2022(Updated: )
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cobbler Project Cobbler | <3.3.1 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
pip/cobbler | <3.3.1 | 3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45083 is a vulnerability in Cobbler before version 3.3.1 that allows local users with non-privileged access to the server to read sensitive information.
CVE-2021-45083 has a severity level of 7.1 (high).
CVE-2021-45083 allows local users to read sensitive information from files in the /etc/cobbler directory.
To fix CVE-2021-45083, you should upgrade Cobbler to version 3.3.1 or higher.
Yes, you can find more information about CVE-2021-45083 at the following references: [link1], [link2], and [link3].