Описание
A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.
Отчет
This issue was rated as Important. Command injection vulnerability in Foreman's WebSocket proxy. Exploitation occurs when an administrator configures a malicious compute resource server and subsequently accesses its VM console functionality. Successful exploitation can lead to remote code execution on the Foreman server, potentially compromising sensitive credentials and the entire managed infrastructure.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Satellite 6 | satellite-utils:el8/foreman | Affected | ||
| Red Hat Satellite 6.16 for RHEL 8 | foreman | Fixed | RHSA-2026:5971 | 26.03.2026 |
| Red Hat Satellite 6.16 for RHEL 9 | foreman | Fixed | RHSA-2026:5971 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | foreman | Fixed | RHSA-2026:5970 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | libcomps | Fixed | RHSA-2026:5970 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | python-brotli | Fixed | RHSA-2026:5970 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | python-django | Fixed | RHSA-2026:5970 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | python-pulp-container | Fixed | RHSA-2026:5970 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | python-pulp-rpm | Fixed | RHSA-2026:5970 | 26.03.2026 |
| Red Hat Satellite 6.17 for RHEL 9 | rubygem-fog-kubevirt | Fixed | RHSA-2026:5970 | 26.03.2026 |
Показывать по
Дополнительная информация
Статус:
EPSS
8 High
CVSS3
Связанные уязвимости
A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.
A flaw was found in Foreman. A remote attacker could exploit a command ...
A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.
EPSS
8 High
CVSS3