CVE-2015-7544
redhat-support-plugin-rhev: Remote code execution by SuperUser role on hosts in RHEV
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
redhat-support-plugin-rhev in Red Hat Enterprise Virtualization Manager (aka RHEV Manager) before 3.6 allows remote authenticated users with the SuperUser role on any Entity to execute arbitrary commands on any host in the RHEV environment.
redhat-support-plugin-rhev en Red Hat Enterprise Virtualization Manager (también llamado RHEV Manager) en versiones anteriores a la 3.6 permite que los usuarios autenticados remotos con el papel de SuperUser en cualquier entidad ejecuten código arbitrario en cualquier host en el entorno RHEV.
It was found that redhat-support-plugin-rhev passed a user-specified path and file name directly to the command line in the log viewer component. This could allow users with the SuperUser role on any Entity to execute arbitrary commands on any host in the RHEV environment.
The Red Hat Support plug-in for Red Hat Enterprise Virtualization offers seamless integrated access to Red Hat subscription services from the Red Hat Enterprise Virtualization administration portal. The plug-in provides automated functionality that enables quicker help, answers, and proactive services. It offers easy and instant access to Red Hat exclusive knowledge, resources, engagement, and diagnostic features. It was found that redhat-support-plugin-rhev passed a user-specified path and file name directly to the command line in the log viewer component. This could allow users with the SuperUser role on any Entity to execute arbitrary commands on any host in the RHEV environment.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-09-29 CVE Reserved
- 2016-03-10 CVE Published
- 2024-08-06 CVE Updated
- 2025-04-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1269588 | 2016-03-09 | |
https://rhn.redhat.com/errata/RHSA-2016-0426.html | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2015-7544 | 2016-03-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Enterprise Virtualization Manager Search vendor "Redhat" for product "Enterprise Virtualization Manager" | 3.4 Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "3.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Virtualization Manager Search vendor "Redhat" for product "Enterprise Virtualization Manager" | 3.4.1 Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "3.4.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Virtualization Manager Search vendor "Redhat" for product "Enterprise Virtualization Manager" | 3.5.0 Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "3.5.0" | - |
Affected
|