Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-47533: Improper Authentication (CWE-287) | https://github.com/zetraxz/CVE-2024-47533 | POC Details |
| 2 | CVE-2024-47533: Cobbler Authentication Bypass & Code Execution | https://github.com/baph00met/CVE-2024-47533 | POC Details |
| 3 | CVE-2024-47533 is a critical authentication bypass vulnerability in Cobbler (versions 3.0.0 to before 3.2.3 and 3.3.7) allowing unauthenticated remote code execution via the XMLRPC interface. | https://github.com/dollarboysushil/CVE-2024-47533-Cobbler-XMLRPC-Authentication-Bypass-RCE-Exploit-POC | POC Details |
| 4 | None | https://github.com/00xCanelo/CVE-2024-47533-PoC | POC Details |
| 5 | None | https://github.com/okkotsu1/CVE-2024-47533 | POC Details |
| 6 | Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-47533.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet