← Volver a CVEs
CVE-2024-41954
MEDIUM5.3
Descripcion
FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
Detalles CVE
Puntuacion CVSS v3.15.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado7/31/2024
Ultima modificacion9/5/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
fogproject:fogproject
Debilidades (CWE)
CWE-732CWE-732
Referencias
https://github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90(security-advisories@github.com)
https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c(security-advisories@github.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.