Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-1000226Incorrect Permission Assignment in Project Cobbler

Severity
9.8CRITICALNVD
EPSS
60.0%
top 1.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 20
Latest updateNov 13

Description

Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note thi

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Ubuntucobbler_project/cobbler< 2.4.1-0ubuntu2+esm1

🔴Vulnerability Details

5
OSV
cobbler vulnerabilities2023-11-13
GHSA
Cobbler Improper Validation of Security Tokens2022-05-13
OSV
Cobbler Improper Validation of Security Tokens2022-05-13
OSV
CVE-2018-1000226: Cobbler version Verified as present in Cobbler versions 22018-08-20
CVEList
CVE-2018-1000226: Cobbler version Verified as present in Cobbler versions 22018-08-20

💥Exploits & PoCs

1
Nuclei
Cobbler - Authentication Bypass

📋Vendor Advisories

2
Ubuntu
Cobbler vulnerabilities2023-11-13
Red Hat
cobbler: XMLRPC API endpoints are not correctly validating security tokens2018-08-02

💬Community

1
Bugzilla
CVE-2018-1000226 cobbler: XMLRPC API endpoints are not correctly validating security tokens2018-08-03
CVE-2018-1000226 — Incorrect Permission Assignment | cvebase