ID CVE-2018-10931
Summary It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
References
Vulnerable Configurations
CVSS
Base: None
Impact:
Exploitability:
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-2372.NASL
    description An update for cobbler is now available for Red Hat Satellite 5.6, Red Hat Satellite 5.7, and Red Hat Satellite 5.8. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Cobbler is a network install server. Cobbler supports PXE, virtualized installs, and re-installing existing Linux machines. Cobbler has a XMLRPC API for integration with other applications. Security Fix(es) : * cobbler: CobblerXMLRPCInterface exports all its methods over XMLRPC (CVE-2018-10931) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. This issue was discovered by Cedric Buissart (Red Hat).
    last seen 2018-08-10
    modified 2018-08-10
    plugin id 111623
    published 2018-08-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111623
    title RHEL 6 : cobbler (RHSA-2018:2372)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-952.NASL
    description This update for cobbler fixes the following issues : Security issues fixed : - Forbid exposure of private methods in the API (CVE-2018-10931, CVE-2018-1000225, bsc#1104287, bsc#1104189, bsc#1105442) - Check access token when calling 'modify_setting' API endpoint (bsc#1104190, bsc#1105440, CVE-2018-1000226) Other bugs fixed : - Do not try to hardlink to a symlink. The result will be a dangling symlink in the general case. (bsc#1097733) - fix kernel options when generating bootiso (bsc#1101670) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2018-09-05
    modified 2018-09-04
    plugin id 112266
    published 2018-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112266
    title openSUSE Security Update : cobbler (openSUSE-2018-952)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-2550-1.NASL
    description This update for cobbler fixes the following issues: Security issue fixed : - CVE-2018-10931: Forbid exposure of private methods in the API (bsc#1104287, bsc#1104189) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-05
    modified 2018-09-04
    plugin id 112271
    published 2018-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112271
    title SUSE SLES11 Security Update : cobbler (SUSE-SU-2018:2550-1)
redhat via4
advisories
rhsa
id RHSA-2018:2372
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10931
Last major update 09-08-2018 - 16:29
Published 09-08-2018 - 16:29
Last modified 10-08-2018 - 21:29
Back to Top