The cbis_manager Podman container is vulnerable to remote command execution via the /api/plugins endpoint. Improper sanitization of the HTTP Headers X-FILENAME, X-PAGE, and X-FIELD allows for command injection. These headers are directly utilized within the subprocess.Popen Python function without adequate validation, enabling a remote attacker to execute arbitrary commands on the underlying system by crafting malicious header values within an HTTP request to the affected endpoint.
The web service executes with root privileges within the container environment, the demonstrated remote code execution permits an attacker to acquire elevated privileges for the command execution.
Restricting access to the management network with an external firewall can partially mitigate this risk.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Sep 2025 06:15:00 +0000

Type Values Removed Values Added
Description The cbis_manager Podman container is vulnerable to remote command execution via the /api/plugins endpoint. Improper sanitization of the HTTP Headers X-FILENAME, X-PAGE, and X-FIELD allows for command injection. These headers are directly utilized within the subprocess.Popen Python function without adequate validation, enabling a remote attacker to execute arbitrary commands on the underlying system by crafting malicious header values within an HTTP request to the affected endpoint. The web service executes with root privileges within the container environment, the demonstrated remote code execution permits an attacker to acquire elevated privileges for the command execution. Restricting access to the management network with an external firewall can partially mitigate this risk.
Title Remote Code Execution
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Nokia

Published:

Updated: 2025-09-18T06:11:53.618Z

Reserved: 2023-11-27T09:09:46.615Z

Link: CVE-2023-49565

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-18T06:15:34.720

Modified: 2025-09-18T06:15:34.720

Link: CVE-2023-49565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.