CVE-2024-41954
CVSS V2 None
CVSS V3 None
Description
FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
Overview
- CVE ID
- CVE-2024-41954
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-31T19:23:41.492Z
- Last Modified Date
- 2024-07-31T20:30:19.312Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c | x_refsource_CONFIRM |
https://github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-41954 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41954 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-01 13:10:31 | Added to TrackCVE |