CVE-2024-39916

July 12, 2024, 4:34 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

FOG Project

  • 1.5.10.30

Source

security-advisories@github.com

Tags

CVE-2024-39916 details

Published : July 12, 2024, 3:15 p.m.
Last Modified : July 12, 2024, 4:34 p.m.

Description

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. There is a security issue with the NFS configuration in /etc/exports generated by the installer that allows an attacker to modify files outside the export in the default installation. The exports have the no_subtree_check option. The no_subtree_check option means that if a client performs a file operation, the server will only check if the requested file is on the correct filesystem, not if it is in the correct directory. This enables modifying files in /images, accessing other files on the same filesystem, and accessing files on other filesystems. This vulnerability is fixed in 1.5.10.30.

CVSS Score

1 2 3 4 5 6.4 7 8 9 10

Weakness

Weakness Name Description
CWE-453 Insecure Default Variable Initialization The product, by default, initializes an internal variable with an insecure or less secure value than is possible.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

Base Score

6.4

Exploitability Score

3.1

Impact Score

2.7

Base Severity

MEDIUM

This website uses the NVD API, but is not approved or certified by it.