TROYANOSYVIRUS
Back to CVEs

CVE-2024-41954

MEDIUM
5.3

Description

FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.

CVE Details

CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published7/31/2024
Last Modified9/5/2024
Sourcenvd
Honeypot Sightings0

Affected Products

fogproject:fogproject

Weaknesses (CWE)

CWE-732CWE-732

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.