Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2024-47533 — Improper Authentication in Project Cobbler
Severity
9.8CRITICALNVD
EPSS
72.5%
top 1.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 18
Description
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
4OSV▶
cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes↗2024-11-18
GHSA▶
cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes↗2024-11-18
CVEList▶
Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes↗2024-11-18
OSV▶
CVE-2024-47533: Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability st↗2024-11-18
💥Exploits & PoCs
1Nuclei▶
Cobbler 'XML-RPC' - Authentication Bypass