{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T08:03:52.879","vulnerabilities":[{"cve":{"id":"CVE-2024-41108","sourceIdentifier":"security-advisories@github.com","published":"2024-07-31T19:15:12.110","lastModified":"2024-09-05T16:27:50.103","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host. Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings.  This vulnerability is fixed in 1.5.10.41."},{"lang":"es","value":"FOG es un sistema gratuito de gestión de inventario, imágenes, clonación y rescate de código abierto. Falta el control de acceso de la página hostinfo o éste es inadecuado, ya que solo se requiere la dirección mac del host para obtener la información de configuración. Estos datos solo se pueden recuperar si hay una tarea pendiente en ese host. De lo contrario, aparecerá un mensaje de error que contiene \"¡Invalid tasking!\" Será devuelto. La contraseña de dominio en el volcado de información del host está oculta incluso para los usuarios autenticados, ya que se muestra como una fila de asteriscos al navegar a la configuración de Active Directory del host. Esta vulnerabilidad se solucionó en 1.5.10.41."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*","versionStartIncluding":"1.5.10","versionEndExcluding":"1.5.10.41","matchCriteriaId":"0DD7BD8A-1B66-4868-92EC-0C2A142B937E"}]}]}],"references":[{"url":"https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostinfo.php","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostname.php","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}