Site icon API Security Blog

Exploit for CVE-2024-47533

image
CVE-2024-47533 โ€“ Cobbler XMLRPC Remote Code Execution (Unauthenticated) ๐Ÿ“Œ Summary This repository contains a proof-of-concept (PoC) exploit for CVE-2024-47533, a critical vulnerability in Cobbler's XMLRPC API that allows unauthenticated remote code execution (RCE). An attacker can execute arbitrary system commands without authentication by abusing the XMLRPC endpoint. โš ๏ธ Disclaimer This project is intended for educational and authorized security testing purposes only. Any misuse of this code against systems without permission is illegal. The author is not responsible for any misuse or damages. ๐Ÿ› ๏ธ Technical Details Vulnerability Type: Unauthenticated RCE Affected Component: XMLRPC API Attack Vector: Network Privileges Required: None User Interaction: None The vulnerability occurs because the login() method allows authentication with empty credentials, and user-controlled input can be injected into Cobbler template rendering, leading to arbitrary code execution. ๐Ÿš€ Usage 1๏ธโƒฃ Clone this repository bash git clone https://github.com//CVE-2024-47533-POC.git cd CVE-2024-47533-POC 2๏ธโƒฃ Install dependencies This script requires Python 3.x. No external dependencies are needed, but ensure the xmlrpc.client library is available (default in Python). 3๏ธโƒฃ Run the exploit bash python3 CVE-2024-47533.py โ€“url https://:/RPC2 โ€“cmd "" Example: bash python3 CVE-2024-47533.py โ€“url https://127.0.0.1:25151/RPC2 โ€“cmd "id" ๐Ÿ“‚ File Structure . โ”œโ”€โ”€ CVE-2024-47533.py # Exploit script โ””โ”€โ”€โ€ฆRead More

Exit mobile version