{"id":"UBUNTU-CVE-2017-1000469","details":"Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the \"add repo\" component resulting in arbitrary code execution as root user.","modified":"2026-01-30T00:57:52.082830Z","published":"2018-01-03T20:29:00Z","related":["USN-6475-1"],"upstream":["CVE-2017-1000469"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000469"},{"type":"REPORT","url":"https://github.com/cobbler/cobbler/issues/1845"},{"type":"REPORT","url":"https://github.com/cobbler/cobbler/pull/1893/commits/67087c3f1e60f1028e9aaa04173a7ec112955cac"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6475-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000469"}],"affected":[{"package":{"name":"cobbler","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/cobbler@2.4.1-0ubuntu2+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1-0ubuntu2+esm1"}]}],"versions":["2.4.1-0ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"cobbler","binary_version":"2.4.1-0ubuntu2+esm1"},{"binary_name":"cobbler-common","binary_version":"2.4.1-0ubuntu2+esm1"},{"binary_name":"cobbler-web","binary_version":"2.4.1-0ubuntu2+esm1"},{"binary_name":"koan","binary_version":"2.4.1-0ubuntu2+esm1"},{"binary_name":"python-cobbler","binary_version":"2.4.1-0ubuntu2+esm1"},{"binary_name":"python-koan","binary_version":"2.4.1-0ubuntu2+esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-1000469.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}