GHSA-hfcp-477w-3wjw

Suggest an improvement
Source
https://github.com/advisories/GHSA-hfcp-477w-3wjw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-hfcp-477w-3wjw/GHSA-hfcp-477w-3wjw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hfcp-477w-3wjw
Aliases
Published
2026-02-27T09:30:29Z
Modified
2026-03-27T00:50:14.171499Z
Severity
  • 8.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
rubyipmi is vulnerable to OS Command Injection through malicious usernames
Details

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-02-28T02:45:38Z",
    "severity": "HIGH",
    "nvd_published_at": "2026-02-27T08:17:09Z",
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

RubyGems / rubyipmi

Package

Name
rubyipmi
Purl
pkg:gem/rubyipmi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13.0

Affected versions

0.*
0.3.0
0.3.1
0.3.2
0.3.3
0.4.0
0.5.0
0.5.1
0.6.0
0.7.0
0.8.1
0.9.0
0.9.1
0.9.2
0.9.3
0.10.0
0.11.0
0.11.1
0.12.0
0.12.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-hfcp-477w-3wjw/GHSA-hfcp-477w-3wjw.json"