Vulnerability Name: | CVE-2021-40323 (CCN-210582) | ||||||||||||||||||||||||||||||||
Assigned: | 2021-09-20 | ||||||||||||||||||||||||||||||||
Published: | 2021-09-20 | ||||||||||||||||||||||||||||||||
Updated: | 2021-10-12 | ||||||||||||||||||||||||||||||||
Summary: | Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-40323 Source: XF Type: UNKNOWN cobbler-cve202140323-code-exec(210582) Source: MISC Type: Patch, Third Party Advisory https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a Source: CCN Type: Cobbler GIT Repository Cobbler V3.3.0 Source: MISC Type: Product, Third Party Advisory https://github.com/cobbler/cobbler/releases/tag/v3.3.0 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |