Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4631

Опубликовано: 07 апр. 2026
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.

Отчет

Two configuration factors determine whether a Cockpit installation is vulnerable to remote code execution. First, the hostname injection attack (injecting SSH options like -oProxyCommand via the URL path) is blocked by OpenSSH 9.6 and later, which validates hostnames and rejects shell metacharacters before establishing a connection. Systems running Cockpit 327 or later with an OpenSSH version older than 9.6 are vulnerable to unauthenticated remote code execution in the default configuration. Systems with OpenSSH 9.6 or later are not vulnerable to this attack path. Second, the username injection attack (injecting shell commands via the SSH username) requires that the system's SSH configuration uses the %r (remote username) token within a Match exec directive. This is not part of any default OpenSSH configuration. Systems that do not use %r in a Match exec directive are not vulnerable to this attack path, regardless of OpenSSH version. Both attack paths require network access to the Cockpit web service (port 9090 by default) and that remote host login is enabled, which is the default Cockpit configuration.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7cockpitNot affected
Red Hat Enterprise Linux 8cockpitNot affected
Red Hat Enterprise Linux 10cockpitFixedRHSA-2026:738310.04.2026
Red Hat Enterprise Linux 10.0 Extended Update SupportcockpitFixedRHSA-2026:738110.04.2026
Red Hat Enterprise Linux 9cockpitFixedRHSA-2026:738410.04.2026
Red Hat Enterprise Linux 9cockpitFixedRHSA-2026:738410.04.2026
Red Hat Enterprise Linux 9.6 Extended Update SupportcockpitFixedRHSA-2026:738210.04.2026

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2450246cockpit: Cockpit: Unauthenticated remote code execution due to SSH command-line argument injection

EPSS

Процентиль: 88%
0.03939
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
29 дней назад

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.

CVSS3: 9.8
nvd
29 дней назад

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.

CVSS3: 9.8
debian
29 дней назад

Cockpit's remote login feature passes user-supplied hostnames and user ...

suse-cvrf
23 дня назад

Security update for cockpit

CVSS3: 9.8
github
29 дней назад

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.

EPSS

Процентиль: 88%
0.03939
Низкий

9.8 Critical

CVSS3