diff --git a/gems/rubyipmi/CVE-2026-0980.yml b/gems/rubyipmi/CVE-2026-0980.yml new file mode 100644 index 0000000000..6fb3d72a40 --- /dev/null +++ b/gems/rubyipmi/CVE-2026-0980.yml @@ -0,0 +1,24 @@ +--- +gem: rubyipmi +cve: 2026-0980 +ghsa: hfcp-477w-3wjw +url: https://access.redhat.com/security/cve/CVE-2026-0980 +title: rubyipmi is vulnerable to OS Command Injection through + malicious usernames +date: 2026-02-27 +description: | + A flaw was found in rubyipmi, a gem used in the Baseboard Management + Controller (BMC) component of Red Hat Satellite. An authenticated + attacker with host creation or update permissions could exploit this + vulnerability by crafting a malicious username for the BMC interface. + This could lead to remote code execution (RCE) on the system. +cvss_v3: 8.3 +patched_versions: + - ">= 0.13.0" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2026-0980 + - https://access.redhat.com/security/cve/CVE-2026-0980 + - https://bugzilla.redhat.com/show_bug.cgi?id=2429874 + - https://github.com/logicminds/rubyipmi/commit/252503a7b4dca68388165883b0322024e344a215 + - https://github.com/advisories/GHSA-hfcp-477w-3wjw