GHSA-g34c-mg6m-xvxj

Suggest an improvement
Source
https://github.com/advisories/GHSA-g34c-mg6m-xvxj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g34c-mg6m-xvxj/GHSA-g34c-mg6m-xvxj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g34c-mg6m-xvxj
Aliases
  • CVE-2012-2395
Published
2022-05-17T05:27:39Z
Modified
2024-11-28T05:40:13.947375Z
Summary
Cobbler subject to Command Injection
Details

A Command Injection in actionpower.py in Cobbler prior to v2.6.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the powersystem method in the xmlrpc API.

Database specific
{
    "github_reviewed_at": "2023-02-06T20:08:52Z",
    "cwe_ids": [
        "CWE-77"
    ],
    "nvd_published_at": "2012-06-16T00:55:00Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

PyPI / cobbler

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0

Affected versions

0.*

0.6.3-2