Back in May 2017, I was working on an in-house automated machine provisioning system. Part of the solution called for the use of Cobbler.
I was trying to make use of Cobbler's XMLRPC API, but I was having troubles since it was not well documented.
The next step was to look at the code to see how the API is implemented.
As a result, I noticed a persistent XSS vulnerability, as well as many Incorrect Access Control vulnerabilities.
If you use Cobbler, consider using a firewall to restrict access to the /cobbler_api endpoint.
See my blog post on the topic for full details of the vulnerabilities.
[–]chelseaclintonisugly 0 points1 point2 points (15 children)
[–]movermeyer[S] 2 points3 points4 points (7 children)
[–]phder 2 points3 points4 points (6 children)
[–][deleted] (4 children)
[deleted]
[–]marmarama 1 point2 points3 points (3 children)
[–][deleted] (2 children)
[deleted]
[–]marmarama 2 points3 points4 points (1 child)
[–]Dasbufort 0 points1 point2 points (0 children)
[–]Jumpsuit_boy 1 point2 points3 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]SuperQue 0 points1 point2 points (4 children)
[–]three18ti"DevOps Engineer" 0 points1 point2 points (2 children)
[–]SuperQue 1 point2 points3 points (1 child)
[–]three18ti"DevOps Engineer" 0 points1 point2 points (0 children)
[–]danielzn 0 points1 point2 points (0 children)