Description
FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39290 | FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41. |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-07-31T20:30:19.312Z
Reserved: 2024-07-24T16:51:40.949Z
Link: CVE-2024-41954
Updated: 2024-07-31T20:30:14.166Z
Status : Analyzed
Published: 2024-07-31T20:15:06.587
Modified: 2024-09-05T16:18:09.940
Link: CVE-2024-41954
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD