Miggo Logo

CVE-2022-0860: Improper Authorization in cobbler

8.2

CVSS Score
3.0

Basic Information

EPSS Score
0.69178%
Published
3/11/2022
Updated
11/18/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
cobblerpip< 3.3.23.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing account status checks after authentication. The pre-patch code in pam.py's authenticate() function only called PAM_AUTHENTICATE to verify credentials, but didn't call PAM_ACCT_MGMT to check account expiration/lock status. The commit diff shows the vulnerability was fixed by adding PAM_ACCT_MGMT call after successful authentication. The test case security_test.py demonstrates this by creating an expired user that should fail authentication but previously succeeded.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t I* P*M is *orr**tly *on*i*ur** *n* * us*r ***ount is s*t to *xpir**, t** *xpir** us*r-***ount is still **l* to su***ss*ully lo* into *o**l*r in *ll pl***s (W** UI, *LI & XMLRP*-*PI). T** s*m* *ppli*s to us*r ***ounts wit* p*sswor*s s*t t

Reasoning

T** vuln*r**ility st*ms *rom missin* ***ount st*tus ****ks **t*r *ut**nti**tion. T** pr*-p*t** *o** in p*m.py's *ut**nti**t*() *un*tion only **ll** P*M_*UT**NTI**T* to v*ri*y *r***nti*ls, *ut *i*n't **ll P*M_***T_M*MT to ****k ***ount *xpir*tion/lo*k