Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2021-21996 CVE-2021-27962 CVE-2021-28146 CVE-2021-28147 CVE-2021-28148 CVE-2021-29622 |
CWE-ID | CWE-269 CWE-284 CWE-799 CWE-601 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
zypp-plugin-spacewalk Operating systems & Components / Operating system package or component suseRegisterInfo Operating systems & Components / Operating system package or component supportutils-plugin-susemanager-client Operating systems & Components / Operating system package or component spacewalk-remote-utils Operating systems & Components / Operating system package or component spacewalk-oscap Operating systems & Components / Operating system package or component spacewalk-koan Operating systems & Components / Operating system package or component spacewalk-client-tools Operating systems & Components / Operating system package or component spacewalk-client-setup Operating systems & Components / Operating system package or component spacewalk-check Operating systems & Components / Operating system package or component spacecmd Operating systems & Components / Operating system package or component salt-zsh-completion Operating systems & Components / Operating system package or component salt-fish-completion Operating systems & Components / Operating system package or component salt-bash-completion Operating systems & Components / Operating system package or component python3-zypp-plugin-spacewalk Operating systems & Components / Operating system package or component python3-suseRegisterInfo Operating systems & Components / Operating system package or component python3-spacewalk-oscap Operating systems & Components / Operating system package or component python3-spacewalk-koan Operating systems & Components / Operating system package or component python3-spacewalk-client-tools Operating systems & Components / Operating system package or component python3-spacewalk-client-setup Operating systems & Components / Operating system package or component python3-spacewalk-check Operating systems & Components / Operating system package or component python3-rhnlib Operating systems & Components / Operating system package or component python3-mgr-virtualization-host Operating systems & Components / Operating system package or component python3-mgr-virtualization-common Operating systems & Components / Operating system package or component python3-mgr-push Operating systems & Components / Operating system package or component python3-mgr-osad Operating systems & Components / Operating system package or component python3-mgr-osa-common Operating systems & Components / Operating system package or component python3-mgr-cfg-management Operating systems & Components / Operating system package or component python3-mgr-cfg-client Operating systems & Components / Operating system package or component python3-mgr-cfg-actions Operating systems & Components / Operating system package or component python3-mgr-cfg Operating systems & Components / Operating system package or component python3-jabberpy Operating systems & Components / Operating system package or component python3-hwdata Operating systems & Components / Operating system package or component python3-contextvars Operating systems & Components / Operating system package or component mgr-virtualization-host Operating systems & Components / Operating system package or component mgr-push Operating systems & Components / Operating system package or component mgr-daemon Operating systems & Components / Operating system package or component koan Operating systems & Components / Operating system package or component hwdata Operating systems & Components / Operating system package or component salt-standalone-formulas-configuration Operating systems & Components / Operating system package or component salt-ssh Operating systems & Components / Operating system package or component salt-proxy Operating systems & Components / Operating system package or component salt-minion Operating systems & Components / Operating system package or component salt-master Operating systems & Components / Operating system package or component salt-doc Operating systems & Components / Operating system package or component salt-cloud Operating systems & Components / Operating system package or component salt Operating systems & Components / Operating system package or component python3-uyuni-common-libs Operating systems & Components / Operating system package or component python3-salt Operating systems & Components / Operating system package or component python3-immutables-debuginfo Operating systems & Components / Operating system package or component python3-immutables Operating systems & Components / Operating system package or component python-immutables-debugsource Operating systems & Components / Operating system package or component prometheus-blackbox_exporter-debuginfo Operating systems & Components / Operating system package or component prometheus-blackbox_exporter Operating systems & Components / Operating system package or component grafana Operating systems & Components / Operating system package or component golang-github-prometheus-prometheus Operating systems & Components / Operating system package or component system-user-prometheus Operating systems & Components / Operating system package or component system-user-grafana Operating systems & Components / Operating system package or component mgr-osad Operating systems & Components / Operating system package or component mgr-custom-info Operating systems & Components / Operating system package or component mgr-cfg-management Operating systems & Components / Operating system package or component mgr-cfg-client Operating systems & Components / Operating system package or component mgr-cfg-actions Operating systems & Components / Operating system package or component mgr-cfg Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU58294
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-21996
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Salt download URL. A local user with control over the file source URL and its source_hash URL can gain full file system access as root on a salt minion.
MitigationUpdate the affected package Security Beta update for SUMA client tools to the latest version.
Vulnerable software versionszypp-plugin-spacewalk: before 1.0.10-6.15.1
suseRegisterInfo: before 4.3.1-6.15.2
supportutils-plugin-susemanager-client: before 4.3.1-6.12.2
spacewalk-remote-utils: before 4.3.1-6.9.2
spacewalk-oscap: before 4.3.1-6.9.2
spacewalk-koan: before 4.3.1-6.9.2
spacewalk-client-tools: before 4.3.4-6.33.3
spacewalk-client-setup: before 4.3.4-6.33.3
spacewalk-check: before 4.3.4-6.33.3
spacecmd: before 4.3.4-6.27.1
salt-zsh-completion: before 3003.3-8.44.1
salt-fish-completion: before 3003.3-8.44.1
salt-bash-completion: before 3003.3-8.44.1
python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1
python3-suseRegisterInfo: before 4.3.1-6.15.2
python3-spacewalk-oscap: before 4.3.1-6.9.2
python3-spacewalk-koan: before 4.3.1-6.9.2
python3-spacewalk-client-tools: before 4.3.4-6.33.3
python3-spacewalk-client-setup: before 4.3.4-6.33.3
python3-spacewalk-check: before 4.3.4-6.33.3
python3-rhnlib: before 4.3.1-6.18.2
python3-mgr-virtualization-host: before 4.3.1-4.9.3
python3-mgr-virtualization-common: before 4.3.1-4.9.3
python3-mgr-push: before 4.3.1-4.9.3
python3-mgr-osad: before 4.3.2-4.18.2
python3-mgr-osa-common: before 4.3.2-4.18.2
python3-mgr-cfg-management: before 4.3.2-4.15.1
python3-mgr-cfg-client: before 4.3.2-4.15.1
python3-mgr-cfg-actions: before 4.3.2-4.15.1
python3-mgr-cfg: before 4.3.2-4.15.1
python3-jabberpy: before 0.5-5.5.1
python3-hwdata: before 2.3.5-5.7.1
python3-contextvars: before 2.4-3.3.1
mgr-virtualization-host: before 4.3.1-4.9.3
mgr-push: before 4.3.1-4.9.3
mgr-daemon: before 4.3.2-4.15.2
koan: before 3.0.1-7.12.1
hwdata: before 0.334-6.5.1
salt-standalone-formulas-configuration: before 3003.3-8.44.1
salt-ssh: before 3003.3-8.44.1
salt-proxy: before 3003.3-8.44.1
salt-minion: before 3003.3-8.44.1
salt-master: before 3003.3-8.44.1
salt-doc: before 3003.3-8.44.1
salt-cloud: before 3003.3-8.44.1
salt: before 3003.3-8.44.1
python3-uyuni-common-libs: before 4.3.1-3.21.2
python3-salt: before 3003.3-8.44.1
python3-immutables-debuginfo: before 0.11-3.3.1
python3-immutables: before 0.11-3.3.1
python-immutables-debugsource: before 0.11-3.3.1
prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2
prometheus-blackbox_exporter: before 0.19.0-3.3.2
grafana: before 7.5.7-4.15.3
golang-github-prometheus-prometheus: before 2.27.1-6.21.2
system-user-prometheus: before 1.0.0-3.5.1
system-user-grafana: before 1.0.0-3.5.1
mgr-osad: before 4.3.2-4.18.2
mgr-custom-info: before 4.3.2-4.9.1
mgr-cfg-management: before 4.3.2-4.15.1
mgr-cfg-client: before 4.3.2-4.15.1
mgr-cfg-actions: before 4.3.2-4.15.1
mgr-cfg: before 4.3.2-4.15.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51579
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-27962
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges within the application.
The vulnerability exists due to improper privilege management. A remote user with Editor privileges can bypass data source permissions on the organization's default data source.
Update the affected package Security Beta update for SUMA client tools to the latest version.
Vulnerable software versionszypp-plugin-spacewalk: before 1.0.10-6.15.1
suseRegisterInfo: before 4.3.1-6.15.2
supportutils-plugin-susemanager-client: before 4.3.1-6.12.2
spacewalk-remote-utils: before 4.3.1-6.9.2
spacewalk-oscap: before 4.3.1-6.9.2
spacewalk-koan: before 4.3.1-6.9.2
spacewalk-client-tools: before 4.3.4-6.33.3
spacewalk-client-setup: before 4.3.4-6.33.3
spacewalk-check: before 4.3.4-6.33.3
spacecmd: before 4.3.4-6.27.1
salt-zsh-completion: before 3003.3-8.44.1
salt-fish-completion: before 3003.3-8.44.1
salt-bash-completion: before 3003.3-8.44.1
python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1
python3-suseRegisterInfo: before 4.3.1-6.15.2
python3-spacewalk-oscap: before 4.3.1-6.9.2
python3-spacewalk-koan: before 4.3.1-6.9.2
python3-spacewalk-client-tools: before 4.3.4-6.33.3
python3-spacewalk-client-setup: before 4.3.4-6.33.3
python3-spacewalk-check: before 4.3.4-6.33.3
python3-rhnlib: before 4.3.1-6.18.2
python3-mgr-virtualization-host: before 4.3.1-4.9.3
python3-mgr-virtualization-common: before 4.3.1-4.9.3
python3-mgr-push: before 4.3.1-4.9.3
python3-mgr-osad: before 4.3.2-4.18.2
python3-mgr-osa-common: before 4.3.2-4.18.2
python3-mgr-cfg-management: before 4.3.2-4.15.1
python3-mgr-cfg-client: before 4.3.2-4.15.1
python3-mgr-cfg-actions: before 4.3.2-4.15.1
python3-mgr-cfg: before 4.3.2-4.15.1
python3-jabberpy: before 0.5-5.5.1
python3-hwdata: before 2.3.5-5.7.1
python3-contextvars: before 2.4-3.3.1
mgr-virtualization-host: before 4.3.1-4.9.3
mgr-push: before 4.3.1-4.9.3
mgr-daemon: before 4.3.2-4.15.2
koan: before 3.0.1-7.12.1
hwdata: before 0.334-6.5.1
salt-standalone-formulas-configuration: before 3003.3-8.44.1
salt-ssh: before 3003.3-8.44.1
salt-proxy: before 3003.3-8.44.1
salt-minion: before 3003.3-8.44.1
salt-master: before 3003.3-8.44.1
salt-doc: before 3003.3-8.44.1
salt-cloud: before 3003.3-8.44.1
salt: before 3003.3-8.44.1
python3-uyuni-common-libs: before 4.3.1-3.21.2
python3-salt: before 3003.3-8.44.1
python3-immutables-debuginfo: before 0.11-3.3.1
python3-immutables: before 0.11-3.3.1
python-immutables-debugsource: before 0.11-3.3.1
prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2
prometheus-blackbox_exporter: before 0.19.0-3.3.2
grafana: before 7.5.7-4.15.3
golang-github-prometheus-prometheus: before 2.27.1-6.21.2
system-user-prometheus: before 1.0.0-3.5.1
system-user-grafana: before 1.0.0-3.5.1
mgr-osad: before 4.3.2-4.18.2
mgr-custom-info: before 4.3.2-4.9.1
mgr-cfg-management: before 4.3.2-4.15.1
mgr-cfg-client: before 4.3.2-4.15.1
mgr-cfg-actions: before 4.3.2-4.15.1
mgr-cfg: before 4.3.2-4.15.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51580
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28146
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and add external groups to existing teams.
Update the affected package Security Beta update for SUMA client tools to the latest version.
Vulnerable software versionszypp-plugin-spacewalk: before 1.0.10-6.15.1
suseRegisterInfo: before 4.3.1-6.15.2
supportutils-plugin-susemanager-client: before 4.3.1-6.12.2
spacewalk-remote-utils: before 4.3.1-6.9.2
spacewalk-oscap: before 4.3.1-6.9.2
spacewalk-koan: before 4.3.1-6.9.2
spacewalk-client-tools: before 4.3.4-6.33.3
spacewalk-client-setup: before 4.3.4-6.33.3
spacewalk-check: before 4.3.4-6.33.3
spacecmd: before 4.3.4-6.27.1
salt-zsh-completion: before 3003.3-8.44.1
salt-fish-completion: before 3003.3-8.44.1
salt-bash-completion: before 3003.3-8.44.1
python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1
python3-suseRegisterInfo: before 4.3.1-6.15.2
python3-spacewalk-oscap: before 4.3.1-6.9.2
python3-spacewalk-koan: before 4.3.1-6.9.2
python3-spacewalk-client-tools: before 4.3.4-6.33.3
python3-spacewalk-client-setup: before 4.3.4-6.33.3
python3-spacewalk-check: before 4.3.4-6.33.3
python3-rhnlib: before 4.3.1-6.18.2
python3-mgr-virtualization-host: before 4.3.1-4.9.3
python3-mgr-virtualization-common: before 4.3.1-4.9.3
python3-mgr-push: before 4.3.1-4.9.3
python3-mgr-osad: before 4.3.2-4.18.2
python3-mgr-osa-common: before 4.3.2-4.18.2
python3-mgr-cfg-management: before 4.3.2-4.15.1
python3-mgr-cfg-client: before 4.3.2-4.15.1
python3-mgr-cfg-actions: before 4.3.2-4.15.1
python3-mgr-cfg: before 4.3.2-4.15.1
python3-jabberpy: before 0.5-5.5.1
python3-hwdata: before 2.3.5-5.7.1
python3-contextvars: before 2.4-3.3.1
mgr-virtualization-host: before 4.3.1-4.9.3
mgr-push: before 4.3.1-4.9.3
mgr-daemon: before 4.3.2-4.15.2
koan: before 3.0.1-7.12.1
hwdata: before 0.334-6.5.1
salt-standalone-formulas-configuration: before 3003.3-8.44.1
salt-ssh: before 3003.3-8.44.1
salt-proxy: before 3003.3-8.44.1
salt-minion: before 3003.3-8.44.1
salt-master: before 3003.3-8.44.1
salt-doc: before 3003.3-8.44.1
salt-cloud: before 3003.3-8.44.1
salt: before 3003.3-8.44.1
python3-uyuni-common-libs: before 4.3.1-3.21.2
python3-salt: before 3003.3-8.44.1
python3-immutables-debuginfo: before 0.11-3.3.1
python3-immutables: before 0.11-3.3.1
python-immutables-debugsource: before 0.11-3.3.1
prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2
prometheus-blackbox_exporter: before 0.19.0-3.3.2
grafana: before 7.5.7-4.15.3
golang-github-prometheus-prometheus: before 2.27.1-6.21.2
system-user-prometheus: before 1.0.0-3.5.1
system-user-grafana: before 1.0.0-3.5.1
mgr-osad: before 4.3.2-4.18.2
mgr-custom-info: before 4.3.2-4.9.1
mgr-cfg-management: before 4.3.2-4.15.1
mgr-cfg-client: before 4.3.2-4.15.1
mgr-cfg-actions: before 4.3.2-4.15.1
mgr-cfg: before 4.3.2-4.15.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51581
Risk: Medium
CVSSv4.0: 1.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28147
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions, when editorsCanAdmin feature is enabled. A remote user can bypass implemented security restrictions and add external group members to existing teams.
Update the affected package Security Beta update for SUMA client tools to the latest version.
Vulnerable software versionszypp-plugin-spacewalk: before 1.0.10-6.15.1
suseRegisterInfo: before 4.3.1-6.15.2
supportutils-plugin-susemanager-client: before 4.3.1-6.12.2
spacewalk-remote-utils: before 4.3.1-6.9.2
spacewalk-oscap: before 4.3.1-6.9.2
spacewalk-koan: before 4.3.1-6.9.2
spacewalk-client-tools: before 4.3.4-6.33.3
spacewalk-client-setup: before 4.3.4-6.33.3
spacewalk-check: before 4.3.4-6.33.3
spacecmd: before 4.3.4-6.27.1
salt-zsh-completion: before 3003.3-8.44.1
salt-fish-completion: before 3003.3-8.44.1
salt-bash-completion: before 3003.3-8.44.1
python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1
python3-suseRegisterInfo: before 4.3.1-6.15.2
python3-spacewalk-oscap: before 4.3.1-6.9.2
python3-spacewalk-koan: before 4.3.1-6.9.2
python3-spacewalk-client-tools: before 4.3.4-6.33.3
python3-spacewalk-client-setup: before 4.3.4-6.33.3
python3-spacewalk-check: before 4.3.4-6.33.3
python3-rhnlib: before 4.3.1-6.18.2
python3-mgr-virtualization-host: before 4.3.1-4.9.3
python3-mgr-virtualization-common: before 4.3.1-4.9.3
python3-mgr-push: before 4.3.1-4.9.3
python3-mgr-osad: before 4.3.2-4.18.2
python3-mgr-osa-common: before 4.3.2-4.18.2
python3-mgr-cfg-management: before 4.3.2-4.15.1
python3-mgr-cfg-client: before 4.3.2-4.15.1
python3-mgr-cfg-actions: before 4.3.2-4.15.1
python3-mgr-cfg: before 4.3.2-4.15.1
python3-jabberpy: before 0.5-5.5.1
python3-hwdata: before 2.3.5-5.7.1
python3-contextvars: before 2.4-3.3.1
mgr-virtualization-host: before 4.3.1-4.9.3
mgr-push: before 4.3.1-4.9.3
mgr-daemon: before 4.3.2-4.15.2
koan: before 3.0.1-7.12.1
hwdata: before 0.334-6.5.1
salt-standalone-formulas-configuration: before 3003.3-8.44.1
salt-ssh: before 3003.3-8.44.1
salt-proxy: before 3003.3-8.44.1
salt-minion: before 3003.3-8.44.1
salt-master: before 3003.3-8.44.1
salt-doc: before 3003.3-8.44.1
salt-cloud: before 3003.3-8.44.1
salt: before 3003.3-8.44.1
python3-uyuni-common-libs: before 4.3.1-3.21.2
python3-salt: before 3003.3-8.44.1
python3-immutables-debuginfo: before 0.11-3.3.1
python3-immutables: before 0.11-3.3.1
python-immutables-debugsource: before 0.11-3.3.1
prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2
prometheus-blackbox_exporter: before 0.19.0-3.3.2
grafana: before 7.5.7-4.15.3
golang-github-prometheus-prometheus: before 2.27.1-6.21.2
system-user-prometheus: before 1.0.0-3.5.1
system-user-grafana: before 1.0.0-3.5.1
mgr-osad: before 4.3.2-4.18.2
mgr-custom-info: before 4.3.2-4.9.1
mgr-cfg-management: before 4.3.2-4.15.1
mgr-cfg-client: before 4.3.2-4.15.1
mgr-cfg-actions: before 4.3.2-4.15.1
mgr-cfg: before 4.3.2-4.15.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51582
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28148
CWE-ID:
CWE-799 - Improper Control of Interaction Frequency
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to absent control of interaction frequency within the HTTP API endpoint for insights usage. A remote non-authenticated attacker send multiple HTTP requests and perform a denial of service (DoS) attack.
Update the affected package Security Beta update for SUMA client tools to the latest version.
Vulnerable software versionszypp-plugin-spacewalk: before 1.0.10-6.15.1
suseRegisterInfo: before 4.3.1-6.15.2
supportutils-plugin-susemanager-client: before 4.3.1-6.12.2
spacewalk-remote-utils: before 4.3.1-6.9.2
spacewalk-oscap: before 4.3.1-6.9.2
spacewalk-koan: before 4.3.1-6.9.2
spacewalk-client-tools: before 4.3.4-6.33.3
spacewalk-client-setup: before 4.3.4-6.33.3
spacewalk-check: before 4.3.4-6.33.3
spacecmd: before 4.3.4-6.27.1
salt-zsh-completion: before 3003.3-8.44.1
salt-fish-completion: before 3003.3-8.44.1
salt-bash-completion: before 3003.3-8.44.1
python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1
python3-suseRegisterInfo: before 4.3.1-6.15.2
python3-spacewalk-oscap: before 4.3.1-6.9.2
python3-spacewalk-koan: before 4.3.1-6.9.2
python3-spacewalk-client-tools: before 4.3.4-6.33.3
python3-spacewalk-client-setup: before 4.3.4-6.33.3
python3-spacewalk-check: before 4.3.4-6.33.3
python3-rhnlib: before 4.3.1-6.18.2
python3-mgr-virtualization-host: before 4.3.1-4.9.3
python3-mgr-virtualization-common: before 4.3.1-4.9.3
python3-mgr-push: before 4.3.1-4.9.3
python3-mgr-osad: before 4.3.2-4.18.2
python3-mgr-osa-common: before 4.3.2-4.18.2
python3-mgr-cfg-management: before 4.3.2-4.15.1
python3-mgr-cfg-client: before 4.3.2-4.15.1
python3-mgr-cfg-actions: before 4.3.2-4.15.1
python3-mgr-cfg: before 4.3.2-4.15.1
python3-jabberpy: before 0.5-5.5.1
python3-hwdata: before 2.3.5-5.7.1
python3-contextvars: before 2.4-3.3.1
mgr-virtualization-host: before 4.3.1-4.9.3
mgr-push: before 4.3.1-4.9.3
mgr-daemon: before 4.3.2-4.15.2
koan: before 3.0.1-7.12.1
hwdata: before 0.334-6.5.1
salt-standalone-formulas-configuration: before 3003.3-8.44.1
salt-ssh: before 3003.3-8.44.1
salt-proxy: before 3003.3-8.44.1
salt-minion: before 3003.3-8.44.1
salt-master: before 3003.3-8.44.1
salt-doc: before 3003.3-8.44.1
salt-cloud: before 3003.3-8.44.1
salt: before 3003.3-8.44.1
python3-uyuni-common-libs: before 4.3.1-3.21.2
python3-salt: before 3003.3-8.44.1
python3-immutables-debuginfo: before 0.11-3.3.1
python3-immutables: before 0.11-3.3.1
python-immutables-debugsource: before 0.11-3.3.1
prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2
prometheus-blackbox_exporter: before 0.19.0-3.3.2
grafana: before 7.5.7-4.15.3
golang-github-prometheus-prometheus: before 2.27.1-6.21.2
system-user-prometheus: before 1.0.0-3.5.1
system-user-grafana: before 1.0.0-3.5.1
mgr-osad: before 4.3.2-4.18.2
mgr-custom-info: before 4.3.2-4.9.1
mgr-cfg-management: before 4.3.2-4.15.1
mgr-cfg-client: before 4.3.2-4.15.1
mgr-cfg-actions: before 4.3.2-4.15.1
mgr-cfg: before 4.3.2-4.15.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53343
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-29622
CWE-ID:
CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
MitigationUpdate the affected package Security Beta update for SUMA client tools to the latest version.
Vulnerable software versionszypp-plugin-spacewalk: before 1.0.10-6.15.1
suseRegisterInfo: before 4.3.1-6.15.2
supportutils-plugin-susemanager-client: before 4.3.1-6.12.2
spacewalk-remote-utils: before 4.3.1-6.9.2
spacewalk-oscap: before 4.3.1-6.9.2
spacewalk-koan: before 4.3.1-6.9.2
spacewalk-client-tools: before 4.3.4-6.33.3
spacewalk-client-setup: before 4.3.4-6.33.3
spacewalk-check: before 4.3.4-6.33.3
spacecmd: before 4.3.4-6.27.1
salt-zsh-completion: before 3003.3-8.44.1
salt-fish-completion: before 3003.3-8.44.1
salt-bash-completion: before 3003.3-8.44.1
python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1
python3-suseRegisterInfo: before 4.3.1-6.15.2
python3-spacewalk-oscap: before 4.3.1-6.9.2
python3-spacewalk-koan: before 4.3.1-6.9.2
python3-spacewalk-client-tools: before 4.3.4-6.33.3
python3-spacewalk-client-setup: before 4.3.4-6.33.3
python3-spacewalk-check: before 4.3.4-6.33.3
python3-rhnlib: before 4.3.1-6.18.2
python3-mgr-virtualization-host: before 4.3.1-4.9.3
python3-mgr-virtualization-common: before 4.3.1-4.9.3
python3-mgr-push: before 4.3.1-4.9.3
python3-mgr-osad: before 4.3.2-4.18.2
python3-mgr-osa-common: before 4.3.2-4.18.2
python3-mgr-cfg-management: before 4.3.2-4.15.1
python3-mgr-cfg-client: before 4.3.2-4.15.1
python3-mgr-cfg-actions: before 4.3.2-4.15.1
python3-mgr-cfg: before 4.3.2-4.15.1
python3-jabberpy: before 0.5-5.5.1
python3-hwdata: before 2.3.5-5.7.1
python3-contextvars: before 2.4-3.3.1
mgr-virtualization-host: before 4.3.1-4.9.3
mgr-push: before 4.3.1-4.9.3
mgr-daemon: before 4.3.2-4.15.2
koan: before 3.0.1-7.12.1
hwdata: before 0.334-6.5.1
salt-standalone-formulas-configuration: before 3003.3-8.44.1
salt-ssh: before 3003.3-8.44.1
salt-proxy: before 3003.3-8.44.1
salt-minion: before 3003.3-8.44.1
salt-master: before 3003.3-8.44.1
salt-doc: before 3003.3-8.44.1
salt-cloud: before 3003.3-8.44.1
salt: before 3003.3-8.44.1
python3-uyuni-common-libs: before 4.3.1-3.21.2
python3-salt: before 3003.3-8.44.1
python3-immutables-debuginfo: before 0.11-3.3.1
python3-immutables: before 0.11-3.3.1
python-immutables-debugsource: before 0.11-3.3.1
prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2
prometheus-blackbox_exporter: before 0.19.0-3.3.2
grafana: before 7.5.7-4.15.3
golang-github-prometheus-prometheus: before 2.27.1-6.21.2
system-user-prometheus: before 1.0.0-3.5.1
system-user-grafana: before 1.0.0-3.5.1
mgr-osad: before 4.3.2-4.18.2
mgr-custom-info: before 4.3.2-4.9.1
mgr-cfg-management: before 4.3.2-4.15.1
mgr-cfg-client: before 4.3.2-4.15.1
mgr-cfg-actions: before 4.3.2-4.15.1
mgr-cfg: before 4.3.2-4.15.1
CPE2.3http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.