Skip to content

Commit 63dcd4a

Browse files
1 parent c953e0d commit 63dcd4a

2 files changed

Lines changed: 70 additions & 8 deletions

File tree

advisories/unreviewed/2026/02/GHSA-7g5x-9c4v-4w5r/GHSA-7g5x-9c4v-4w5r.json renamed to advisories/github-reviewed/2026/02/GHSA-7g5x-9c4v-4w5r/GHSA-7g5x-9c4v-4w5r.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,57 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7g5x-9c4v-4w5r",
4-
"modified": "2026-02-27T09:30:29Z",
4+
"modified": "2026-02-28T02:44:46Z",
55
"published": "2026-02-27T09:30:29Z",
66
"aliases": [
77
"CVE-2025-12150"
88
],
9+
"summary": "Keycloak REST Services has a WebAuthn Attestation Statement Verification Bypass",
910
"details": "A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: \"none\", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.4.4"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12150"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/35110"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://github.com/keycloak/keycloak/issues/43723"
2550
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/keycloak/keycloak/commit/4136a677e7e24f6685ed25567e191e1003200339"
54+
},
2655
{
2756
"type": "WEB",
2857
"url": "https://access.redhat.com/errata/RHSA-2025:21370"
@@ -46,15 +75,19 @@
4675
{
4776
"type": "WEB",
4877
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406192"
78+
},
79+
{
80+
"type": "PACKAGE",
81+
"url": "https://github.com/keycloak/keycloak"
4982
}
5083
],
5184
"database_specific": {
5285
"cwe_ids": [
5386
"CWE-347"
5487
],
5588
"severity": "LOW",
56-
"github_reviewed": false,
57-
"github_reviewed_at": null,
89+
"github_reviewed": true,
90+
"github_reviewed_at": "2026-02-28T02:44:46Z",
5891
"nvd_published_at": "2026-02-27T09:16:15Z"
5992
}
6093
}

advisories/unreviewed/2026/02/GHSA-hfcp-477w-3wjw/GHSA-hfcp-477w-3wjw.json renamed to advisories/github-reviewed/2026/02/GHSA-hfcp-477w-3wjw/GHSA-hfcp-477w-3wjw.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,69 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hfcp-477w-3wjw",
4-
"modified": "2026-02-27T09:30:29Z",
4+
"modified": "2026-02-28T02:45:38Z",
55
"published": "2026-02-27T09:30:29Z",
66
"aliases": [
77
"CVE-2026-0980"
88
],
9+
"summary": "rubyipmi is vulnerable to OS Command Injection through malicious usernames",
910
"details": "A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "RubyGems",
21+
"name": "rubyipmi"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.13.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0980"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/logicminds/rubyipmi/commit/252503a7b4dca68388165883b0322024e344a215"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://access.redhat.com/security/cve/CVE-2026-0980"
2550
},
2651
{
2752
"type": "WEB",
2853
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429874"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/logicminds/rubyipmi"
2958
}
3059
],
3160
"database_specific": {
3261
"cwe_ids": [
3362
"CWE-78"
3463
],
3564
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-28T02:45:38Z",
3867
"nvd_published_at": "2026-02-27T08:17:09Z"
3968
}
4069
}

0 commit comments

Comments
 (0)