Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-47533 PoC — Cobbler 授权问题漏洞

Source
Associated Vulnerability
Title:Cobbler 授权问题漏洞 (CVE-2024-47533)
Description:Cobbler是Cobbler开源的一款网络安装服务器套件,它主要用于快速建立Linux网络安装环境。 Cobbler 3.0.0到3.2.3和3.3.7之前版本存在授权问题漏洞,该漏洞源于身份验证不当,导致任何能够通过网络访问服务器的人都可以完全控制该服务器。
Readme
# CVE-2024-47533 – Cobbler XML-RPC Authentication Bypass Exploit

## 📜 Description

CVE-2024-47533 is a **critical authentication bypass vulnerability** in [Cobbler](https://github.com/cobbler/cobbler), a Linux installation server that automates network-based OS installs.  
The flaw is caused by an issue in `utils.get_shared_secret()` which **always returns `-1`**, enabling **unauthenticated** access to the Cobbler XML-RPC API.

An attacker can connect with:
- **Username:** `""` (empty string)  
- **Password:** `-1`  

This grants **administrator-level access** to perform actions like adding distros, managing profiles, or executing system commands via Cobbler.

- **Affected Versions:** 3.0.0 → before 3.2.3 and 3.3.0 → before 3.3.7  
- **Patched Versions:** 3.2.3 and 3.3.7  
- **CVSS Score:** 9.8 (Critical)  

---

## ⚠️ Disclaimer

This repository is for **educational and authorized security testing** only.  
Do **NOT** run this exploit on systems you do not own or have explicit permission to test.  
The author(s) are not responsible for any misuse.

---


File Snapshot

[4.0K] /data/pocs/98a34cceb143b4b049ba2a15afbfd4351078874b ├── [2.4K] CVE-2024-47533.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.