Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: python313Packages.libcomps

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-1961
8.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 weeks, 5 days ago
Forman: foreman: remote code execution via command injection in websocket proxy

A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.

References

Affected products

foreman
  • *
libcomps
  • *
satellite
  • *
python-brotli
  • *
python-django
  • *
python-pulp-rpm
  • *
rubygem-katello
  • *
rubygem-rubyipmi
  • *
rubygem-fog-kubevirt
  • *
python-pulp-container
  • *
rubygem-foreman_kubevirt
  • *
yggdrasil-worker-forwarder
  • *
satellite-utils:el8/foreman

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

pkgs.satellite

Program for showing navigation satellite data

Package maintainers