Bug #38885
closed
CVE-2025-10622: OS command injection via ct_location and fcct_location parameters
Added by Ondřej Gajdušek 3 months ago.
Updated 2 months ago.
Description
A command injection vulnerability was found in Foreman 3.12.0. The whitelist for CoreOS Transpiler Command (ct_location) and Fedora CoreOS Transpiler Command (fcct_location) is only enforced
client-side, not server-side. This allows authenticated users with edit_settings permissions to bypass safe mode rendering and execute arbitrary commands on the underlying OS.
- Category set to Security
- Assignee set to Ondřej Gajdušek
- Priority changed from Normal to Immediate
- Target version set to 3.17.0
- Red Hat JIRA set to SAT-38820
- Fixed in Releases 3.17.0 added
- Status changed from New to Ready For Testing
- Pull request https://github.com/theforeman/foreman/pull/10751 added
- Pull request https://github.com/theforeman/foreman/pull/10752 added
- Status changed from Ready For Testing to Closed
- Fixed in Releases 3.16.1 added
- Fixed in Releases 3.15.1 added
- Pull request https://github.com/theforeman/foreman/pull/10762 added
Also available in: Atom
PDF