FKIE_CVE-2008-6954
Vulnerability from fkie_nvd - Published: 2009-08-12 10:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2918B32-247E-482A-B0A7-4FAE6D6D6DFC",
"versionEndIncluding": "1.2.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFB6CA1-8DE6-46A2-B651-9185B5C3F2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F56967E4-ED40-41BF-9C91-7954A010AF63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2572B0E1-B53E-4321-AEFF-9693BDB4BDEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6FA453-E023-4F97-A8D8-AF237E380388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "627B0E5A-ADCC-42BD-BB59-AEF9E644DACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B59B8107-434B-4840-AC71-7F8C5B49DAB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5D040E2B-7C70-4472-BC3D-05E3A3ED3737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9F8A0A-64A8-485D-A9D7-D7AC21DFF72D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F63C6E4-14DD-4478-8BAA-339AD0ACCD62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04B41068-0E9E-4E07-BB13-F36DAEE72FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5E229C4C-B695-4206-ACBB-F5CC650839B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "853B8AF2-A457-4B55-BF75-DB9D8DE223B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC609A3-8BEC-434D-B54D-35C37D1D1F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "084D307A-8D04-4CA6-8578-671DEE947F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCE8A70-8380-4B3D-B21B-5DC4DE89BA44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DEFF3158-173F-49A7-83A7-A81B4FC01415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0619FD9-7B6D-4DCB-ABFF-F88836929A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7DCE6AEA-64C4-4C14-B86B-3C23DCA1681D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E8A8A7-2C7F-4472-8325-F084422EF292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "309F7F4F-FDA3-4DDB-ADC9-3B3FBCB1EC4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "36D63C65-AB90-4333-B65A-01E8169B5949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "841920B9-7D97-4307-B26B-A4CC8719D1CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB39A4A-3E43-4136-81CD-B60794EC404E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07589167-C139-41FF-903E-9368C614F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63A5A98D-B58F-49BD-B592-ADF7C24B2914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C6422638-6A04-4C78-A2EE-A2EF306EC437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF19E29-9CA7-4020-9493-37F1303D1872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "370D7F49-D17C-4E15-B32E-EB70B7132073",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "44F6519E-D036-4C98-A801-0C7BFAD5D83A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "34821A36-4C63-40BA-B45F-0C7B6B6D2455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA84D7-1B4B-4C07-8743-9D1B291A9EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3E173676-83B1-44FE-9739-CA46FDE94944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8F114D84-0D39-47B1-B337-A2616E672346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFDEAC9-E8AC-4597-A584-A5989F11BE04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB865F95-A38D-4A67-8219-AA74946F4571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90C6F857-41DD-46E4-9D58-DF95EF2D0711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1347D094-2161-4FAA-9208-4EAB6E6E5A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED95EDC-D6A6-4011-908E-E9540B708651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6C225ECD-81C9-45CF-AAD2-51C1093DCBA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4E3814-CC61-4777-8560-BD942EECED66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "392DF7EC-212D-4EF1-ABE8-72FC4A3788AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules."
},
{
"lang": "es",
"value": "La interfaz web en Cobbler (CobblerWeb) anterior a v1.29, permite a usuarios autenticados remotamente ejecutar c\u00f3digo Python de su elecci\u00f3n en cobblerd, mediante la edici\u00f3n de la plantilla \"Cheetah kickstart\" a los m\u00f3dulos \"import Python\" arbitrarios."
}
],
"id": "CVE-2008-6954",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-08-12T10:30:00.877",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://freshmeat.net/projects/cobbler/releases/288374"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/50291"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32737"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32804"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/32317"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46625"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00462.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00485.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://freshmeat.net/projects/cobbler/releases/288374"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/50291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32804"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/32317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00462.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00485.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…