Cobbler 漏洞列表
共找到 10 个与 Cobbler 相关的漏洞
📅 加载漏洞趋势中...
-
CNVD-2018-16876: Cobbler任意文件读取漏洞 POC
Cobbler是一款网络安装服务器套件,它能够快速建立Linux网络安装环境。 Cobbler 2.6.11-1版本中存在任意文件读取漏洞。攻击者可利用该漏洞读取任意文件。 -
cobbler-default-login: Cobbler Default Login POC
Cobbler default login credentials for the testing module (testing/testing) were discovered. fofa "Cobbler" -
cobbler-exposed-directory: Exposed Cobbler Directories POC
Searches for exposed Cobbler Directories -
cobbler-webgui: Cobbler WebGUI Detection POC
Detection of Cobbler WebGUI shodan-query: http.title:"Cobbler Web Interface" -
CVE-2018-1000226: Cobbler - Authentication Bypass POC
Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ and possibly even older versions, may be vulnerable to an authentication bypass vulnerability in XMLRPC API (/cobbler_api) that can result in privilege escalation, data manipulation or exfiltration, and LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931. -
CVE-2021-40323: Cobbler <3.3.0 - Remote Code Execution POC
Cobbler before 3.3.0 allows log poisoning and resultant remote code execution via an XMLRPC method. -
CVE-2024-47533: Cobbler 'XML-RPC' - Authentication Bypass POC
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue. -
Cobbler get_shared_secret 未授权 身份验证缺陷漏洞 无POC
-
Cobbler 不正确的访问控制漏洞 无POC
Cobbler存在不正确的访问控制漏洞,此漏洞是由于程序在包含cobbler_api接口在内的多个接口上未充分验证用户的身份所导致的。 -
Cobbler cobbler_api 存在代码注入漏洞(CVE-2021-40323) 无POC
Cobbler是一款专注于自动化Linux系统安装和配置管理的工具,可帮助管理员快速部署服务器并确保配置一致性,支持多种操作系统和提供多项功能强大的特性,如Kickstart配置、PXE引导、DHCP管理等,提升系统管理效率和可靠性。该产品在3.3.0之前版本存在远程代码执行漏洞,该漏洞源于外部输入数据构造代码段的过程中,网络系统或产品未能正确过滤其中的特殊元素,攻击者可利用该漏洞通过特制的XMLRPC方法记录日志文件以进行模板注入,从而导致日志中毒和远程代码执行。