{ "id": "CVE-2014-3225", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-14T00:55:11.057", "lastModified": "2018-10-09T19:43:43.347", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile." }, { "lang": "es", "value": "Vulnerabilidad de recorrido de directorio absoluto en la interfaz web en Cobbler 2.4.x hasta 2.6.x permite a usuarios remotos autenticados leer archivos arbitrarios a trav\u00e9s del campo Kickstart en un perfil." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "77E45FEE-77FD-4E38-A437-530DB0FB0726" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0875D8D3-9421-4E74-AC82-00F444971EFC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "A83D8CA5-9B9D-4BFF-8DBF-4EFD79AA9485" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B202661-286F-45BD-9402-BF744AD23521" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCAB8299-192E-45A3-96DA-A2D047A30639" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C55580F-7FA7-445C-AC12-FC145C5EBF1E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cobblerd:cobbler:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF231D52-CB23-4312-80E0-B4E3A0AB69DA" } ] } ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/126553/Cobbler-Local-File-Inclusion.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://seclists.org/oss-sec/2014/q2/273", "source": "cve@mitre.org" }, { "url": "http://seclists.org/oss-sec/2014/q2/274", "source": "cve@mitre.org" }, { "url": "http://www.exploit-db.com/exploits/33252", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.securityfocus.com/archive/1/532094/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/67277", "source": "cve@mitre.org" }, { "url": "https://github.com/cobbler/cobbler/issues/939", "source": "cve@mitre.org" }, { "url": "https://www.youtube.com/watch?v=vuBaoQUFEYQ&feature=youtu.be", "source": "cve@mitre.org", "tags": [ "Exploit" ] } ] }