CVE编号
CVE-2021-45083利用情况
暂无补丁情况
N/A披露时间
2022-02-21漏洞描述
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1193671 | |
https://github.com/cobbler/cobbler/releases | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://www.openwall.com/lists/oss-security/2022/02/18/3 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cobbler_project | cobbler | * |
Up to (excluding) 3.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_34 | cobbler | * |
Up to (excluding) 3.2.2-10.fc34 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_35 | cobbler | * |
Up to (excluding) 3.2.2-10.fc35 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_36 | cobbler | * |
Up to (excluding) 3.3.1-1.fc36 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | cobbler | * |
Up to (excluding) 2.8.5-4.el7 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_Epel_8_Modular | cobbler | * |
Up to (excluding) 3-820220302010749.9edba152 |
|||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...