Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-0980

Опубликовано: 15 янв. 2020
Источник: redhat
CVSS3: 8.3
EPSS Низкий

Описание

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.

Отчет

This vulnerability is rated Moderate for Red Hat Satellite because it requires the BMC component to be enabled and configured to use ipmitool as the IPMI implementation. An authenticated attacker with host creation or update permissions can exploit this by crafting a malicious BMC username. Exploitation is limited to environments meeting these specific configuration and permission requirements.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 6rubygem-rubyipmiAffected
Red Hat Satellite 6satellite:el8/rubygem-rubyipmiAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2429874rubyipmi: Red Hat Satellite: Remote Code Execution in rubyipmi via malicious BMC username

EPSS

Процентиль: 23%
0.00076
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
nvd
около 1 месяца назад

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.

CVSS3: 8.3
github
около 1 месяца назад

rubyipmi is vulnerable to OS Command Injection through malicious usernames

EPSS

Процентиль: 23%
0.00076
Низкий

8.3 High

CVSS3