Incorrect Default Permissions in Cobbler
High severity
GitHub Reviewed
Published
Feb 21, 2022
to the GitHub Advisory Database
•
Updated Sep 13, 2024
Description
Published by the National Vulnerability Database
Feb 20, 2022
Published to the GitHub Advisory Database
Feb 21, 2022
Reviewed
Mar 8, 2022
Last updated
Sep 13, 2024
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
References