Lucene search

K
githubGitHub Advisory DatabaseGHSA-HPJ3-5P46-G87W
HistoryMay 17, 2022 - 4:30 a.m.

Cobbler vulnerable to code injection via unsafe YAML loading

2022-05-1704:30:25
CWE-20
CWE-94
GitHub Advisory Database
github.com
3

7.6 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.7%

The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.

Affected configurations

Vulners
Node
github_advisory_databasecobblerRange<2.6.0
CPENameOperatorVersion
cobblerlt2.6.0

7.6 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.7%