CVE-2010-2235

CVSS V2 High 8.5 CVSS V3 None
Description
template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954.
Overview
  • CVE ID
  • CVE-2010-2235
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2010-12-09T20:00:17
  • Last Modified Date
  • 2023-02-13T04:20:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:* 1 OR 2.0.4
cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.8-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.2.9-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.3.1-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.3.3-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.3.4-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.0-2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.1-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.2-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.4.3-4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.1-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.2-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.3-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.4-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.5-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.6-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:1.6.8-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.0-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.1-1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.3.1-2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:michael_dehaan:cobbler:2.0.4-1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:S/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 8.5
  • Severity
  • HIGH
  • Exploitability Score
  • 6.8
  • Impact Score
  • 10
History
Created Old Value New Value Data Type Notes
2022-05-10 11:08:04 Added to TrackCVE
2023-02-02 19:03:01 2023-02-02T17:17:40 CVE Modified Date updated
2023-02-02 19:03:01 Analyzed Modified Vulnerability Status updated
2023-02-02 19:03:03 template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954. CVE-2010-2235 RHN Satellite (cobbler): Code injection flaw (ACE as root) by processing of a specially-crafted kickstart template file Description updated
2023-02-02 19:03:06 References updated
2023-02-13 05:04:03 2023-02-13T04:20:59 CVE Modified Date updated
2023-02-13 05:04:03 CVE-2010-2235 RHN Satellite (cobbler): Code injection flaw (ACE as root) by processing of a specially-crafted kickstart template file template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954. Description updated