CVE Number – CVE-2018-1000226
A vulnerability in the XML Remote Procedure Call (XMLRPC) API of Cobbler could allow an unauthenticated, remote attacker to gain unauthorized access to a targeted system.
The vulnerability is due to improper validation of security tokens by the XMLRPC API endpoints of the affected software. An attacker could exploit this vulnerability to perform unauthorized actions on a targeted system, such as gaining elevated privileges, modifying or accessing data, or accessing sensitive information.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.
Cobbler has confirmed the vulnerability; however, software updates are not available.
A successful exploit of this vulnerability could allow the attacker to perform unauthorized actions on a targeted system, which may result in a complete system compromise. Administrators may consider using a firewall to restrict access to the XMLRPC API endpoints used by the affected software.
Administrators are advised to contact the vendor regarding future updates and releases.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to run both firewall and antivirus applications to minimize the potential of inbound and outbound threats.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators can help protect affected systems from external attacks by using a solid firewall strategy.
Administrators are advised to monitor affected systems.
Cobbler has released an issue report at the following link: Issue #1916
At the time this alert was first published, Cobbler had not released software updates.
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.