|
|
Message-ID: <CAK4yqw5WmSY=YDLj3CLmvh+mxtQ7g_YNThLKPhA44R3BEG1Pnw@mail.gmail.com> Date: Fri, 27 Mar 2026 12:33:16 +0100 From: Ondrej Gajdusek <ogajduse@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE-2026-1961: Foreman: Remote Code Execution via command injection in WebSocket proxy Hi, A security vulnerability has been fixed in Foreman, an open-source infrastructure lifecycle management tool. CVE-2026-1961: Remote Code Execution via command injection in WebSocket proxy A command injection vulnerability was discovered in Foreman's WebSocket proxy implementation. The vulnerability occurs when constructing shell commands using unsanitized hostname values from compute resource providers (such as VMware vSphere, Libvirt, etc.). An attacker operating a malicious compute resource server can achieve remote code execution on the Foreman server when an administrator accesses VM console functionality through the normal workflow. Affected versions: Foreman up to and including 3.18.0 CVSS v3.1 Score: 8.0 (High) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Fixed in: Foreman 3.18.1, Foreman 3.17.2, Foreman 3.16.3 Credit: Houssam Sahli References: - Foreman security page: https://theforeman.org/security.html#2026-1961 - Redmine issue: https://projects.theforeman.org/issues/39121 - GitHub PR: https://github.com/theforeman/foreman/pull/10921 Thanks, Ondrej Gajdusek Foreman Project
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.