what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files

Cobbler 2.6.0 Arbitrary File Read
Posted May 13, 2014
Authored by Dolev Farhi

Cobbler versions 2.6.0 and below suffer from an arbitrary file read vulnerability.

tags | exploit, arbitrary
advisories | CVE-2014-3225
SHA-256 | 497ed8c35ababfe7320d0530b3d28ddb9cfc0de530e9750bb755847db44423a6

Related Files

Red Hat Security Advisory 2018-2372-01
Posted Aug 9, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2372-01 - Cobbler is a network install server. Cobbler supports PXE, virtualized installs, and re-installing existing Linux machines. Cobbler has a XMLRPC API for integration with other applications. Issues addressed include a method disclosure vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2018-10931
SHA-256 | 5e102b6d7009188abe113a563bfde8a621677eef7808d531c0f59470391d2215
Cobbler Local File Inclusion
Posted May 8, 2014
Authored by Dolev Farhi

Cobbler versions 2.4.x through 2.6.x suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 2e95e8c1d7b784a8a867b18e9c0497e669454dba4841fb5be6e965abdc4b7b32
Red Hat Security Advisory 2012-1060-01
Posted Jul 9, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1060-01 - Cobbler is a network install server. Cobbler supports PXE, virtualized installs, and re-installing existing Linux machines. A command injection flaw was found in Cobbler's power management XML-RPC method. A remote, authenticated user who is permitted to perform Cobbler configuration changes via the Cobbler XML-RPC API, could use this flaw to execute arbitrary code with root privileges on the Red Hat Network Satellite server. Note: Red Hat Network Satellite uses a special user account to configure Cobbler. By default, only this account is permitted to perform Cobbler configuration changes, and the credentials for the account are only accessible to the Satellite host's administrator. As such, this issue only affected environments where the administrator allowed other users to make Cobbler configuration changes.

tags | advisory, remote, arbitrary, root
systems | linux, redhat
advisories | CVE-2012-2395
SHA-256 | a117798edbaaae98d35e372b2a965c0e26a3e98bfd81b95555118ca270a44f0b
Secunia Security Advisory 49265
Posted May 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cobbler. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
systems | linux, suse
SHA-256 | 9b2b777076f0077659ec329d9c211e8f33c419c5815f5bc8b059ee6bee3fb43c
Secunia Security Advisory 48926
Posted Apr 24, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cobbler. This fixes a security issue and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, by malicious users to compromise a vulnerable system, and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, local, vulnerability, csrf
systems | linux, suse
SHA-256 | 0cdee108aa0d0563cc352478ace6570a3993063983f8d7ed2ff02596fc42de88
Secunia Security Advisory 48779
Posted Apr 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and two vulnerabilities have been reported in Cobbler, which can be exploited by malicious, local users to perform certain actions with escalated privileges, by malicious users to compromise a vulnerable system, and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, local, vulnerability, csrf
SHA-256 | 7bc5cf3271baf05f646adb22b7aa7af0afdec7693e33a4db833ce05d28150f37
Secunia Security Advisory 42602
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Cobbler, which can be exploited by malicious, local users to manipulate certain data.

tags | advisory, local
SHA-256 | 3586e44cf2d9a36d0f3099b0364d2500198c689fef49d3b60cdca093e2f62777
Secunia Security Advisory 41883
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cobbler. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
systems | linux, redhat
SHA-256 | 03fddd23db68259bf18767470c47ef25cd708f6866554cd686db6f676cfa1bd7
Secunia Security Advisory 32804
Posted Nov 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cobbler. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
systems | linux, fedora
SHA-256 | f39f10ba6c7c45c87e968ac7db2f22f6a6e3b00ed3adfecd0a460821bfda453c
Secunia Security Advisory 32737
Posted Nov 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cobbler, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
SHA-256 | e0818a00eac0a6118d740a248ead98a9d30b29d1f130d8c571be0d15c1a1f74c
Page 1 of 1
Back1Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close