CVE-2018-1000226
Description
Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cobbler's XMLRPC API fails to validate security tokens on many endpoints, allowing unauthenticated remote attackers to escalate privileges, manipulate data, or harvest LDAP credentials.
Vulnerability
Cobbler versions 2.0.0+ (verified in 2.6.11+) suffer from an incorrect access control vulnerability in the XMLRPC API (/cobbler_api). The API exposes 195 methods, but many of them do not validate the security token passed by the client, including dangerous endpoints such as modify_setting and upload_log_data. This allows any network-accessible attacker to bypass authentication entirely [1][2][3].
Exploitation
An attacker with network connectivity to the Cobbler server can send crafted XMLRPC requests to the /cobbler_api endpoint. For example, by calling modify_setting with a bogus token, the attacker can enable anamon_enabled (which is normally disabled and guarded) and then use upload_log_data to write arbitrary files to the server. No valid credentials are needed [1][3].
Impact
Successful exploitation leads to privilege escalation, data manipulation or exfiltration, and LDAP credential harvesting. The upload_log_data endpoint can be abused to write files, potentially leading to remote code execution if an attacker uploads a malicious script. The compromise gives the attacker full control over the Cobbler configuration and managed systems [1][2][3].
Mitigation
As of the publication date (2018-08-20), no official patch had been released. The primary workaround is to restrict network access to the /cobbler_api endpoint using a firewall or other network-level controls. Users should monitor the Cobbler project for a fix and upgrade when available [1][3][4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cobblerPyPI | < 3.0.0 | 3.0.0 |
Affected products
12- ghsa-coords12 versionspkg:pypi/cobblerpkg:rpm/opensuse/cobbler&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/cobbler&distro=openSUSE%20Tumbleweedpkg:rpm/suse/cobbler&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Server%203.0pkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Server%203.1pkg:rpm/suse/cobbler&distro=SUSE%20Manager%20Server%203.2pkg:rpm/suse/cobbler&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/cobbler&distro=SUSE%20Package%20Hub%2015%20SP2pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%203.1pkg:rpm/suse/release-notes-susemanager-proxy&distro=SUSE%20Manager%20Proxy%203.1
< 3.0.0+ 11 more
- (no CPE)range: < 3.0.0
- (no CPE)range: < 3.1.2-lp152.6.3.1
- (no CPE)range: < 3.2.1.336+git.5639a3af-1.1
- (no CPE)range: < 2.6.6-49.14.1
- (no CPE)range: < 2.6.6-49.14.1
- (no CPE)range: < 2.6.6-49.14.1
- (no CPE)range: < 2.6.6-5.17.1
- (no CPE)range: < 2.6.6-6.7.1
- (no CPE)range: < 2.6.6-49.14.1
- (no CPE)range: < 3.1.2-bp152.4.3.1
- (no CPE)range: < 3.1.8-5.38.1
- (no CPE)range: < 3.1.8-0.15.29.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-f88q-22g8-frcgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-1000226ghsaADVISORY
- github.com/cobbler/cobbler/issues/1916ghsax_refsource_CONFIRMWEB
- movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-apighsaWEB
- movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.