Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-40323Code Injection in Project Cobbler

Severity
9.8CRITICALNVD
EPSS
93.2%
top 0.20%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 4
Latest updateOct 1

Description

Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

4
OSV
Cobbler before 3.3.0 allows log poisoning2021-10-05
GHSA
Cobbler before 3.3.0 allows log poisoning2021-10-05
CVEList
CVE-2021-40323: Cobbler before 32021-10-04
OSV
CVE-2021-40323: Cobbler before 32021-10-04

💥Exploits & PoCs

1
Nuclei
Cobbler <3.3.0 - Remote Code Execution

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Clobber API XMLRPC Template Injection (CVE-2021-40323)2024-10-01

📋Vendor Advisories

2
Ubuntu
Cobbler vulnerabilities2023-11-13
Red Hat
cobbler: Arbitrary File Disclosure/Template Injection via generate_script RPC method2021-09-20
CVE-2021-40323 — Code Injection in Project Cobbler | cvebase