Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-47533 PoC β€” Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes

Source
Associated Vulnerability
Title:Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes (CVE-2024-47533)
Description:Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
Readme
# CVE-2024-47533 – Cobbler XML-RPC Authentication Bypass Exploit

## πŸ“œ Description

CVE-2024-47533 is a **critical authentication bypass vulnerability** in [Cobbler](https://github.com/cobbler/cobbler), a Linux installation server that automates network-based OS installs.  
The flaw is caused by an issue in `utils.get_shared_secret()` which **always returns `-1`**, enabling **unauthenticated** access to the Cobbler XML-RPC API.

An attacker can connect with:
- **Username:** `""` (empty string)  
- **Password:** `-1`  

This grants **administrator-level access** to perform actions like adding distros, managing profiles, or executing system commands via Cobbler.

- **Affected Versions:** 3.0.0 β†’ before 3.2.3 and 3.3.0 β†’ before 3.3.7  
- **Patched Versions:** 3.2.3 and 3.3.7  
- **CVSS Score:** 9.8 (Critical)  

---

## ⚠️ Disclaimer

This repository is for **educational and authorized security testing** only.  
Do **NOT** run this exploit on systems you do not own or have explicit permission to test.  
The author(s) are not responsible for any misuse.

---


File Snapshot

[4.0K] /data/pocs/98a34cceb143b4b049ba2a15afbfd4351078874b β”œβ”€β”€ [2.4K] CVE-2024-47533.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’