{"id":"CVE-2018-10931","details":"It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.","aliases":["GHSA-8787-63px-3m23"],"modified":"2026-04-11T12:06:38.468123Z","published":"2018-08-09T20:29:00.347Z","related":["SUSE-SU-2018:2550-1","SUSE-SU-2018:2551-1","SUSE-SU-2018:2561-1","SUSE-SU-2018:2608-1","openSUSE-SU-2021:0046-1","openSUSE-SU-2021:0058-1","openSUSE-SU-2024:10690-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"5.6"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.7"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.8"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5Q4ACIVZ5D4KSUDLGRTOKGGB4U42SD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMWK5KCCZXOGOYNR2H6BWDSABTQ5NYJA/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10931"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cobbler/cobbler","events":[{"introduced":"6579d326ff09f9da113f68b79f29adf0daad7ed9"},{"last_affected":"8cb36fc1b48c57761a65cea33e6191b6c712d1ee"}],"database_specific":{"extracted_events":[{"introduced":"2.6.0"},{"last_affected":"2.6.11"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*"}}],"versions":["v2.6.0","v2.6.1","v2.6.10","v2.6.11","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.6.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-10931.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}