Cobbler xmlrpc API power_system Method Remote Shell Command Execution

Medium Nessus Plugin ID 59402

Synopsis

The remote service is affected by a command injection vulnerability.

Description

According to its self-reported version, the Cobbler install on the
remote host is affected by a command injection vulnerability that can
be exploited by sending a specially crafted username or password
argument to the 'power_system' method.

Successful exploitation requires an authenticated user and xmlrpc API
access.

Solution

Upgrade to the latest developmental version of Cobbler or apply the
fixes manually.

See Also

http://www.nessus.org/u?0c3391f4

https://github.com/cobbler/cobbler/issues/141

https://bugs.launchpad.net/ubuntu/+source/cobbler/+bug/978999

Plugin Details

Severity: Medium

ID: 59402

File Name: cobbler_power_command_injection.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 2012/06/07

Modified: 2018/06/13

Dependencies: 59401, 59400

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:michael_dehaan:cobbler

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/05/29

Vulnerability Publication Date: 2012/04/11

Reference Information

CVE: CVE-2012-2395

BID: 53666