CVE-2024-47533:
cobbler allows anyone to connect to cobbler XML-RPC server with known password and make changes
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/18/2024
Updated
11/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
cobbler | pip | >= 3.3.0, < 3.3.7 | 3.3.7 |
cobbler | pip | >= 3.0.0, < 3.2.3 | 3.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from utils.get_shared_secret() in cobbler/utils.py. The function uses 'rb' (binary mode) with an encoding parameter in the open() call, which is invalid in Python. This always triggers an exception, causing the function to return -1 instead of the actual secret. The XML-RPC authentication mechanism accepts this -1 as valid credentials when combined with an empty username, enabling unauthorized access. The commit diff shows the problematic encoding addition to the binary mode file open operation, and the PoC demonstrates exploitation using these predictable credentials.