Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1961

Опубликовано: 26 мар. 2026
Источник: redhat
CVSS3: 8
EPSS Низкий

Описание

A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.

Отчет

This issue was rated as Important. Command injection vulnerability in Foreman's WebSocket proxy. Exploitation occurs when an administrator configures a malicious compute resource server and subsequently accesses its VM console functionality. Successful exploitation can lead to remote code execution on the Foreman server, potentially compromising sensitive credentials and the entire managed infrastructure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 6satellite-utils:el8/foremanAffected
Red Hat Satellite 6.16 for RHEL 8foremanFixedRHSA-2026:597126.03.2026
Red Hat Satellite 6.16 for RHEL 9foremanFixedRHSA-2026:597126.03.2026
Red Hat Satellite 6.17 for RHEL 9foremanFixedRHSA-2026:597026.03.2026
Red Hat Satellite 6.17 for RHEL 9libcompsFixedRHSA-2026:597026.03.2026
Red Hat Satellite 6.17 for RHEL 9python-brotliFixedRHSA-2026:597026.03.2026
Red Hat Satellite 6.17 for RHEL 9python-djangoFixedRHSA-2026:597026.03.2026
Red Hat Satellite 6.17 for RHEL 9python-pulp-containerFixedRHSA-2026:597026.03.2026
Red Hat Satellite 6.17 for RHEL 9python-pulp-rpmFixedRHSA-2026:597026.03.2026
Red Hat Satellite 6.17 for RHEL 9rubygem-fog-kubevirtFixedRHSA-2026:597026.03.2026

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2437036forman: Foreman: Remote Code Execution via command injection in WebSocket proxy

EPSS

Процентиль: 30%
0.00116
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
nvd
6 дней назад

A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.

CVSS3: 8
debian
6 дней назад

A flaw was found in Foreman. A remote attacker could exploit a command ...

CVSS3: 8
github
6 дней назад

A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.

EPSS

Процентиль: 30%
0.00116
Низкий

8 High

CVSS3