9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.8%
Cobbler version Verified as present in Cobbler versions 2.6.11+, but code
inspection suggests at least 2.0.0+ or possibly even older versions may be
vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API
(/cobbler_api) that can result in Privilege escalation, data manipulation
or exfiltration, LDAP credential harvesting. This attack appear to be
exploitable via “network connectivity”. Taking advantage of improper
validation of security tokens in API endpoints. Please note this is a
different issue than CVE-2018-10931.
github.com/cobbler/cobbler/issues/1916
launchpad.net/bugs/cve/CVE-2018-1000226
movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/
nvd.nist.gov/vuln/detail/CVE-2018-1000226
security-tracker.debian.org/tracker/CVE-2018-1000226
ubuntu.com/security/notices/USN-6475-1
www.cve.org/CVERecord?id=CVE-2018-1000226
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
85.8%