Vulnerability Details : CVE-2014-3225
Potential exploit
Absolute path traversal vulnerability in the web interface in Cobbler 2.4.x through 2.6.x allows remote authenticated users to read arbitrary files via the Kickstart field in a profile.
Vulnerability category: Directory traversal
Products affected by CVE-2014-3225
- cpe:2.3:a:cobblerd:cobbler:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:cobblerd:cobbler:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:cobblerd:cobbler:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:cobblerd:cobbler:2.4.0:1:*:*:*:*:*:*
- cpe:2.3:a:cobblerd:cobbler:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:cobblerd:cobbler:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:cobblerd:cobbler:2.4.0:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3225
6.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3225
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2014-3225
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3225
-
http://packetstormsecurity.com/files/126553/Cobbler-Local-File-Inclusion.html
Cobbler Local File Inclusion ≈ Packet StormExploit
-
https://github.com/cobbler/cobbler/issues/939
Cobbler restrict Kickstart Directory (Security Issue) · Issue #939 · cobbler/cobbler · GitHub
-
http://seclists.org/oss-sec/2014/q2/273
oss-sec: CVE Request - Local File inclusion in Cobbler
-
http://www.securityfocus.com/bid/67277
Cobbler 'Kickstart' Value Local File Include Vulnerability
-
http://www.securityfocus.com/archive/1/532094/100/0/threaded
SecurityFocus
-
http://www.exploit-db.com/exploits/33252
Cobbler 2.4.x < 2.6.x - Local File Inclusion - PHP webapps ExploitExploit
-
https://www.youtube.com/watch?v=vuBaoQUFEYQ&feature=youtu.be
YouTubeExploit
-
http://seclists.org/oss-sec/2014/q2/274
oss-sec: Re: CVE Request - Local File inclusion in Cobbler
Jump to