CVE-2021-45083

7.1 HIGH

📋 TL;DR

CVE-2021-45083 is a privilege escalation vulnerability in Cobbler where sensitive files containing password hashes and configuration secrets are world-readable. This allows local users with non-privileged access to potentially crack passwords and gain elevated privileges. Systems running Cobbler versions before 3.3.1 are affected.

💻 Affected Systems

Products:
  • Cobbler
Versions: All versions before 3.3.1
Operating Systems: Linux systems running Cobbler
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations where /etc/cobbler files have world-readable permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker cracks weak password hashes, gains administrative access to Cobbler, and potentially compromises the entire system management infrastructure.

🟠

Likely Case

Local user reads sensitive configuration data and password hashes, enabling privilege escalation within the Cobbler environment.

🟢

If Mitigated

With proper file permissions and strong passwords, impact is limited to information disclosure without successful privilege escalation.

🌐 Internet-Facing: LOW - This is a local file permission issue requiring local access to the server.
🏢 Internal Only: HIGH - Any user with local shell access can read sensitive files and potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and involves simple file reading commands. Password cracking depends on password strength.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.1

Vendor Advisory: https://github.com/cobbler/cobbler/releases/tag/v3.3.1

Restart Required: No

Instructions:

1. Update Cobbler to version 3.3.1 or later using your package manager. 2. For Red Hat/Fedora: 'sudo dnf update cobbler'. 3. For Debian/Ubuntu: 'sudo apt update && sudo apt install cobbler'. 4. Verify file permissions in /etc/cobbler are properly set.

🔧 Temporary Workarounds

Set proper file permissions

linux

Manually change permissions on sensitive files to restrict access to root only

sudo chmod 600 /etc/cobbler/users.digest
sudo chmod 600 /etc/cobbler/settings.yaml
sudo chmod 700 /etc/cobbler

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to Cobbler servers
  • Regularly audit and monitor file permissions in /etc/cobbler directory

🔍 How to Verify

Check if Vulnerable:

Check if Cobbler version is below 3.3.1 and verify file permissions: 'ls -la /etc/cobbler/users.digest /etc/cobbler/settings.yaml' - files should not be world-readable

Check Version:

cobbler --version | head -1

Verify Fix Applied:

Confirm Cobbler version is 3.3.1+ and verify file permissions are restricted: 'stat -c '%a %n' /etc/cobbler/users.digest /etc/cobbler/settings.yaml' should show 600

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /etc/cobbler files
  • Failed authentication attempts followed by successful privileged access

Network Indicators:

  • N/A - This is a local file system vulnerability

SIEM Query:

source="/var/log/secure" AND ("permission denied" OR "access denied") AND "/etc/cobbler"

🔗 References

📤 Share & Export