vulnerability
Ubuntu: USN-6475-1 (CVE-2021-45083): Cobbler vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:N/C:P/I:P/A:N) | Feb 20, 2022 | Nov 16, 2023 | Aug 18, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
Feb 20, 2022
Added
Nov 16, 2023
Modified
Aug 18, 2025
Description
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
Solutions
ubuntu-pro-upgrade-cobblerubuntu-pro-upgrade-cobbler-commonubuntu-pro-upgrade-cobbler-webubuntu-pro-upgrade-koanubuntu-pro-upgrade-python-cobblerubuntu-pro-upgrade-python-koan
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.