Количество 9
Количество 9
GHSA-rq49-h582-83m7
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
CVE-2026-4631
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
CVE-2026-4631
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
CVE-2026-4631
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
CVE-2026-4631
Cockpit's remote login feature passes user-supplied hostnames and user ...
openSUSE-SU-2026:20523-1
Security update for cockpit
ELSA-2026-7384
ELSA-2026-7384: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (CRITICAL)
ELSA-2026-7383
ELSA-2026-7383: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (CRITICAL)
BDU:2026-05259
Уязвимость системы управления серверами Cockpit, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-rq49-h582-83m7 Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability. | CVSS3: 9.8 | 4% Низкий | 29 дней назад | |
CVE-2026-4631 Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability. | CVSS3: 9.8 | 4% Низкий | 29 дней назад | |
CVE-2026-4631 Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability. | CVSS3: 9.8 | 4% Низкий | 29 дней назад | |
CVE-2026-4631 Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability. | CVSS3: 9.8 | 4% Низкий | 29 дней назад | |
CVE-2026-4631 Cockpit's remote login feature passes user-supplied hostnames and user ... | CVSS3: 9.8 | 4% Низкий | 29 дней назад | |
openSUSE-SU-2026:20523-1 Security update for cockpit | 4% Низкий | 23 дня назад | ||
ELSA-2026-7384 ELSA-2026-7384: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (CRITICAL) | 27 дней назад | |||
ELSA-2026-7383 ELSA-2026-7383: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (CRITICAL) | 23 дня назад | |||
BDU:2026-05259 Уязвимость системы управления серверами Cockpit, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 4% Низкий | около 1 месяца назад |
Уязвимостей на страницу