← Retour aux CVEs
CVE-2024-41954
MEDIUM5.3
Description
FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
Details CVE
Score CVSS v3.15.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie7/31/2024
Derniere modification9/5/2024
Sourcenvd
Observations honeypot0
Produits affectes
fogproject:fogproject
Faiblesses (CWE)
CWE-732CWE-732
References
https://github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90(security-advisories@github.com)
https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.