Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
- https://github.com/cobbler/cobbler/security/advisories/GHSA-m26c-fcgh-cp6h
- https://github.com/00xCanelo/CVE-2024-47533-PoC
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/baph00met/CVE-2024-47533
- https://github.com/dollarboysushil/CVE-2024-47533-Cobbler-XMLRPC-Authentication-Bypass-RCE-Exploit-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/okkotsu1/CVE-2024-47533
- https://github.com/yembors64632/cve_monitor_Public
- https://github.com/zetraxz/CVE-2024-47533
- https://github.com/zs1n/CVE-2023-46818
- https://github.com/zs1n/CVE-2024-47533
- https://github.com/zulloper/cve-poc