Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-47533Improper Authentication in Project Cobbler

Severity
9.8CRITICALNVD
EPSS
72.5%
top 1.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 18

Description

Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

PyPIcobbler_project/cobbler3.3.03.3.7+1
CVEListV5cobbler/cobbler>= 3.0.0, < 3.2.3, >= 3.3.0, < 3.3.7+1

🔴Vulnerability Details

4
OSV
cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes2024-11-18
GHSA
cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes2024-11-18
CVEList
Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes2024-11-18
OSV
CVE-2024-47533: Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability st2024-11-18

💥Exploits & PoCs

1
Nuclei
Cobbler 'XML-RPC' - Authentication Bypass
CVE-2024-47533 — Improper Authentication | cvebase