{"id":"CVE-2021-45083","details":"An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.","aliases":["GHSA-5946-mpw5-pqxx","PYSEC-2022-38"],"modified":"2026-04-11T12:38:20.870574Z","published":"2022-02-20T18:15:07.580Z","related":["SUSE-FU-2022:0750-1","SUSE-SU-2022:0507-1","SUSE-SU-2022:0509-1","SUSE-SU-2022:0510-1","SUSE-SU-2022:14891-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"34"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"35"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"36"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/"},{"type":"ADVISORY","url":"https://github.com/cobbler/cobbler/releases"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1193671"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2022/02/18/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cobbler/cobbler","events":[{"introduced":"0"},{"fixed":"f5b0599acce32de4288c76e4f601aece0c664fed"}],"database_specific":{"cpe":"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"3.3.1"}],"source":"CPE_FIELD"}}],"versions":["0.6.0","0.6.5","cobbler-2.0.3.2-1","cobbler-2.2.0-1","cobbler-2.2.1-1","v0.4.0","v0.4.3","v0.4.4","v0.4.5","v0.4.6","v0.4.7","v0.4.8","v0.5.1","v0.6.0","v0.6.1-2","v0.6.2-2","v0.6.3-2","v0.6.4","v0.6.5","v0.8.1","v0.8.2","v0.8.3-2","v0.8.3-3","v1.0.0","v1.0.1","v1.2.0","v1.2.1-1","v1.2.2","v1.2.5","v1.2.6","v1.2.8-1","v1.2.9","v1.4.0-2","v2.0.2-1","v2.0.3","v2.0.3.1","v2.0.3.2-1","v2.1.0","v2.2.0-1","v2.2.1-1","v3.0.0","v3.0.1","v3.1.0","v3.1.1","v3.2.0","v3.2.1","v3.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-45083.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}