A command injection flaw was found in Red Hat Satellite 6.16.5.2 (Foreman 3.12.0.8-1). Although a whitelist for CoreOS Transpiler Command and Fedora CoreOS Transpiler Command is implemented, the whitelist is only enforced on the client-side and is not validated on the server-side. This flaw allows an authenticated user with edit_settings permissions to modify these parameters to achieve arbitrary command execution on underlying operating system and bypass safe mode rendering.
This issue has been addressed in the following products: Red Hat Satellite 6.18 for RHEL 9 Via RHSA-2025:19721 https://access.redhat.com/errata/RHSA-2025:19721
This issue has been addressed in the following products: Red Hat Satellite 6.17 for RHEL 9 Via RHSA-2025:19832 https://access.redhat.com/errata/RHSA-2025:19832
This issue has been addressed in the following products: Red Hat Satellite 6.16 for RHEL 8 Red Hat Satellite 6.16 for RHEL 9 Via RHSA-2025:19855 https://access.redhat.com/errata/RHSA-2025:19855
This issue has been addressed in the following products: Red Hat Satellite 6.15 for RHEL 8 Via RHSA-2025:19856 https://access.redhat.com/errata/RHSA-2025:19856