### [CVE-2024-47533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47533) ![](https://img.shields.io/static/v1?label=Product&message=cobbler&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%203.0.0%2C%20%3C%203.2.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%3A%20Improper%20Authentication&color=brighgreen) ### Description Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue. ### POC #### Reference - https://github.com/cobbler/cobbler/security/advisories/GHSA-m26c-fcgh-cp6h #### Github - https://github.com/00xCanelo/CVE-2024-47533-PoC - https://github.com/baph00met/CVE-2024-47533 - https://github.com/dollarboysushil/CVE-2024-47533-Cobbler-XMLRPC-Authentication-Bypass-RCE-Exploit-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/okkotsu1/CVE-2024-47533 - https://github.com/zs1n/CVE-2023-46818 - https://github.com/zs1n/CVE-2024-47533 - https://github.com/zulloper/cve-poc