FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-07-31T20:30:19.312Z
Reserved: 2024-07-24T16:51:40.949Z
Link: CVE-2024-41954

Updated: 2024-07-31T20:30:14.166Z

Status : Analyzed
Published: 2024-07-31T20:15:06.587
Modified: 2024-09-05T16:18:09.940
Link: CVE-2024-41954

No data.