FKIE_CVE-2009-5021
Vulnerability from fkie_nvd - Published: 2010-12-09 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cobbler before 1.6.1 does not properly determine whether an installation has the default password, which makes it easier for attackers to obtain access by using this password.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1A30A8-8D10-4CFB-AB6D-831557CBCA4A",
"versionEndIncluding": "1.4.3-4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFB6CA1-8DE6-46A2-B651-9185B5C3F2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F56967E4-ED40-41BF-9C91-7954A010AF63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2572B0E1-B53E-4321-AEFF-9693BDB4BDEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6FA453-E023-4F97-A8D8-AF237E380388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "627B0E5A-ADCC-42BD-BB59-AEF9E644DACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B59B8107-434B-4840-AC71-7F8C5B49DAB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5D040E2B-7C70-4472-BC3D-05E3A3ED3737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9F8A0A-64A8-485D-A9D7-D7AC21DFF72D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F63C6E4-14DD-4478-8BAA-339AD0ACCD62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04B41068-0E9E-4E07-BB13-F36DAEE72FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5E229C4C-B695-4206-ACBB-F5CC650839B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "853B8AF2-A457-4B55-BF75-DB9D8DE223B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC609A3-8BEC-434D-B54D-35C37D1D1F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "084D307A-8D04-4CA6-8578-671DEE947F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCE8A70-8380-4B3D-B21B-5DC4DE89BA44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DEFF3158-173F-49A7-83A7-A81B4FC01415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0619FD9-7B6D-4DCB-ABFF-F88836929A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7DCE6AEA-64C4-4C14-B86B-3C23DCA1681D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E8A8A7-2C7F-4472-8325-F084422EF292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "309F7F4F-FDA3-4DDB-ADC9-3B3FBCB1EC4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "36D63C65-AB90-4333-B65A-01E8169B5949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "841920B9-7D97-4307-B26B-A4CC8719D1CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB39A4A-3E43-4136-81CD-B60794EC404E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07589167-C139-41FF-903E-9368C614F782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63A5A98D-B58F-49BD-B592-ADF7C24B2914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C6422638-6A04-4C78-A2EE-A2EF306EC437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF19E29-9CA7-4020-9493-37F1303D1872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "370D7F49-D17C-4E15-B32E-EB70B7132073",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "44F6519E-D036-4C98-A801-0C7BFAD5D83A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "34821A36-4C63-40BA-B45F-0C7B6B6D2455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA84D7-1B4B-4C07-8743-9D1B291A9EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3E173676-83B1-44FE-9739-CA46FDE94944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8F114D84-0D39-47B1-B337-A2616E672346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFDEAC9-E8AC-4597-A584-A5989F11BE04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB865F95-A38D-4A67-8219-AA74946F4571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90C6F857-41DD-46E4-9D58-DF95EF2D0711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1347D094-2161-4FAA-9208-4EAB6E6E5A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED95EDC-D6A6-4011-908E-E9540B708651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6C225ECD-81C9-45CF-AAD2-51C1093DCBA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4E3814-CC61-4777-8560-BD942EECED66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "392DF7EC-212D-4EF1-ABE8-72FC4A3788AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B63EB5FF-90F4-4AA0-8AE4-4A96A4550F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.8-1:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4F2C96-0BB4-446B-B867-185217B8D652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A741C94E-0F82-4E0B-8497-50C126361B9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.2.9-1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F12092B-68F6-4C6A-8349-E93DCCE9A071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "930CA896-159C-476A-98B4-82B1D9B7624C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.3.1-1:*:*:*:*:*:*:*",
"matchCriteriaId": "79979861-DDEC-4A30-8C3D-D319880A7DA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "84AF0249-C9A1-46FE-AA6E-8A59B9BD0EC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.3.3-1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D30F7DB-7BCD-400E-A49E-7ECF8C898EF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB26B6A4-322B-42D9-BC7B-3E21BFAEB5B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.3.4-1:*:*:*:*:*:*:*",
"matchCriteriaId": "E735E39F-C085-4169-8EA5-7A07B68D07D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC1530-73CA-4616-99E8-2A5690A8C392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.0-2:*:*:*:*:*:*:*",
"matchCriteriaId": "BBBA8769-A08E-45D8-A30C-B8AAEACEBE92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "821389C2-FB2B-41E6-96B5-8CB93D79389E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.1-1:*:*:*:*:*:*:*",
"matchCriteriaId": "78AF071D-0F5F-480C-948A-4889D6F36C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "482C46D3-83C3-4BB2-88B7-DE466F19DEE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.2-1:*:*:*:*:*:*:*",
"matchCriteriaId": "5898B895-73AB-44C8-82A2-C38B9E758C4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:michael_dehaan:cobbler:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF0AD72-0A4C-4794-8358-EB71DBCAC82C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cobbler before 1.6.1 does not properly determine whether an installation has the default password, which makes it easier for attackers to obtain access by using this password."
},
{
"lang": "es",
"value": "Cobbler, en versiones anteriores a la 1.6.1, no determina de manera apropiada si una instalaci\u00f3n tiene la contrase\u00f1a por defecto, lo que facilita a los atacantes obtener acceso usando esta contrase\u00f1a."
}
],
"id": "CVE-2009-5021",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-12-09T20:00:01.430",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64734"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64734"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-255"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…