{"id":"USN-6475-1","summary":"cobbler vulnerabilities","details":"It was discovered that Cobbler did not properly handle user input, which\ncould result in an absolute path traversal. An attacker could possibly \nuse this issue to read arbitrary files. (CVE-2014-3225)\n\nIt was discovered that Cobbler did not properly handle user input, which\ncould result in command injection. An attacker could possibly use this \nissue to execute arbitrary code with high privileges. \n(CVE-2017-1000469, CVE-2021-45082)\n\nIt was discovered that Cobbler did not properly hide private functions in\na class. A remote attacker could possibly use this issue to gain high \nprivileges and upload files to an arbitrary location. \n(CVE-2018-10931, CVE-2018-1000225, CVE-2018-1000226)\n\nNicolas Chatelain discovered that Cobbler did not properly handle user \ninput, which could result in log poisoning. A remote attacker could \npossibly use this issue to bypass authorization, write in an arbitrary \nfile, or execute arbitrary code. \n(CVE-2021-40323, CVE-2021-40324, CVE-2021-40325)\n\nIt was discovered that Cobbler did not properly handle file permissions \nduring package install or update operations. An attacker could possibly \nuse this issue to perform a privilege escalation attack. (CVE-2021-45083)\n\nIt was discovered that Cobbler did not properly process credentials for \nexpired accounts. An attacker could possibly use this issue to login to \nthe platform with an expired account or password. (CVE-2022-0860)\n","modified":"2026-02-10T04:43:25Z","published":"2023-11-13T15:04:17Z","related":["UBUNTU-CVE-2014-3225","UBUNTU-CVE-2017-1000469","UBUNTU-CVE-2018-1000225","UBUNTU-CVE-2018-1000226","UBUNTU-CVE-2018-10931","UBUNTU-CVE-2021-40323","UBUNTU-CVE-2021-40324","UBUNTU-CVE-2021-40325","UBUNTU-CVE-2021-45082","UBUNTU-CVE-2021-45083","UBUNTU-CVE-2022-0860"],"upstream":["CVE-2014-3225","CVE-2017-1000469","CVE-2018-1000225","CVE-2018-1000226","CVE-2018-10931","CVE-2021-40323","CVE-2021-40324","CVE-2021-40325","CVE-2021-45082","CVE-2021-45083","CVE-2022-0860","UBUNTU-CVE-2014-3225","UBUNTU-CVE-2017-1000469","UBUNTU-CVE-2018-1000225","UBUNTU-CVE-2018-1000226","UBUNTU-CVE-2018-10931","UBUNTU-CVE-2021-40323","UBUNTU-CVE-2021-40324","UBUNTU-CVE-2021-40325","UBUNTU-CVE-2021-45082","UBUNTU-CVE-2021-45083","UBUNTU-CVE-2022-0860"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6475-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3225"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000469"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10931"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000225"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000226"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-40323"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-40324"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-40325"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45082"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45083"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0860"}],"affected":[{"package":{"name":"cobbler","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/cobbler@2.4.1-0ubuntu2+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1-0ubuntu2+esm1"}]}],"versions":["2.4.1-0ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.4.1-0ubuntu2+esm1","binary_name":"cobbler"},{"binary_version":"2.4.1-0ubuntu2+esm1","binary_name":"cobbler-common"},{"binary_version":"2.4.1-0ubuntu2+esm1","binary_name":"cobbler-web"},{"binary_version":"2.4.1-0ubuntu2+esm1","binary_name":"koan"},{"binary_version":"2.4.1-0ubuntu2+esm1","binary_name":"python-cobbler"},{"binary_version":"2.4.1-0ubuntu2+esm1","binary_name":"python-koan"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-3225"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000469"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-10931"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000225"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000226"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-40323"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-40324"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-40325"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-45082"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-45083"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0860"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6475-1.json"}}],"schema_version":"1.7.3"}