cve/2024/CVE-2024-41108.md
2024-08-06 19:19:10 +00:00

18 lines
1.2 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-41108](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41108)
![](https://img.shields.io/static/v1?label=Product&message=fogproject&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.5.10.41%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host. Otherwise, an error message containing "Invalid tasking!" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings. This vulnerability is fixed in 1.5.10.41.
### POC
#### Reference
- https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g
#### Github
No PoCs found on GitHub currently.