
CVE-2024-47533 โ Cobbler XMLRPC Authentication Bypass RCE Exploit โ ๏ธ Critical Remote Code Execution via Authentication Bypass in Cobbler ๐ ๏ธ PoC implementation by @dollarboysushil ๐ก Overview Cobbler, a Linux installation server that enables rapid setup of network installation environments, has an authentication vulnerability in versions 3.0.0 up to (but not including) 3.2.3 and 3.3.7. The function utils.get_shared_secret() always returns -1, allowing anyone to connect to the Cobbler XML-RPC interface with an empty username ('') and password -1. This lets an attacker with network access gain full control of the Cobbler server. The vulnerability is fixed in versions 3.2.3 and 3.3.7. ๐ Technical Breakdown The vulnerability is caused by improper handling of the shared secret in the utils.get_shared_secret() function, which always returns -1, effectively bypassing authentication. This lets any network user connect to Cobblerโs XMLRPC interface with empty credentials and execute arbitrary commands. ๐ฅ Vulnerable Endpoint https://:25151/ โ Cobbler's XMLRPC API endpoint ๐ฅ Example Payloads The exploit script supports various reverse shell payloads including: Bash reverse shell Netcat shells (nc, nc2) Python reverse shell Curl download & execute ๐ฌ Proof-of-Concept (PoC) Demonstration ๐ก Preparing the Listener Start a Netcat listener on your machine: bash nc -lvnp 4444 ๐ Launching the Exploit Run the exploit script CVE-2024-47533-dbs.py. bash python3 CVE-2024-47533-dbs.py -tโฆRead More
Exploit for CVE-2024-47533

