SUSE update for Security Beta update for SUMA client tools



Risk Medium
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2021-21996
CVE-2021-27962
CVE-2021-28146
CVE-2021-28147
CVE-2021-28148
CVE-2021-29622
CWE-ID CWE-269
CWE-284
CWE-799
CWE-601
Exploitation vector Network
Public exploit N/A
Vulnerable software
zypp-plugin-spacewalk
Operating systems & Components / Operating system package or component

suseRegisterInfo
Operating systems & Components / Operating system package or component

supportutils-plugin-susemanager-client
Operating systems & Components / Operating system package or component

spacewalk-remote-utils
Operating systems & Components / Operating system package or component

spacewalk-oscap
Operating systems & Components / Operating system package or component

spacewalk-koan
Operating systems & Components / Operating system package or component

spacewalk-client-tools
Operating systems & Components / Operating system package or component

spacewalk-client-setup
Operating systems & Components / Operating system package or component

spacewalk-check
Operating systems & Components / Operating system package or component

spacecmd
Operating systems & Components / Operating system package or component

salt-zsh-completion
Operating systems & Components / Operating system package or component

salt-fish-completion
Operating systems & Components / Operating system package or component

salt-bash-completion
Operating systems & Components / Operating system package or component

python3-zypp-plugin-spacewalk
Operating systems & Components / Operating system package or component

python3-suseRegisterInfo
Operating systems & Components / Operating system package or component

python3-spacewalk-oscap
Operating systems & Components / Operating system package or component

python3-spacewalk-koan
Operating systems & Components / Operating system package or component

python3-spacewalk-client-tools
Operating systems & Components / Operating system package or component

python3-spacewalk-client-setup
Operating systems & Components / Operating system package or component

python3-spacewalk-check
Operating systems & Components / Operating system package or component

python3-rhnlib
Operating systems & Components / Operating system package or component

python3-mgr-virtualization-host
Operating systems & Components / Operating system package or component

python3-mgr-virtualization-common
Operating systems & Components / Operating system package or component

python3-mgr-push
Operating systems & Components / Operating system package or component

python3-mgr-osad
Operating systems & Components / Operating system package or component

python3-mgr-osa-common
Operating systems & Components / Operating system package or component

python3-mgr-cfg-management
Operating systems & Components / Operating system package or component

python3-mgr-cfg-client
Operating systems & Components / Operating system package or component

python3-mgr-cfg-actions
Operating systems & Components / Operating system package or component

python3-mgr-cfg
Operating systems & Components / Operating system package or component

python3-jabberpy
Operating systems & Components / Operating system package or component

python3-hwdata
Operating systems & Components / Operating system package or component

python3-contextvars
Operating systems & Components / Operating system package or component

mgr-virtualization-host
Operating systems & Components / Operating system package or component

mgr-push
Operating systems & Components / Operating system package or component

mgr-daemon
Operating systems & Components / Operating system package or component

koan
Operating systems & Components / Operating system package or component

hwdata
Operating systems & Components / Operating system package or component

salt-standalone-formulas-configuration
Operating systems & Components / Operating system package or component

salt-ssh
Operating systems & Components / Operating system package or component

salt-proxy
Operating systems & Components / Operating system package or component

salt-minion
Operating systems & Components / Operating system package or component

salt-master
Operating systems & Components / Operating system package or component

salt-doc
Operating systems & Components / Operating system package or component

salt-cloud
Operating systems & Components / Operating system package or component

salt
Operating systems & Components / Operating system package or component

python3-uyuni-common-libs
Operating systems & Components / Operating system package or component

python3-salt
Operating systems & Components / Operating system package or component

python3-immutables-debuginfo
Operating systems & Components / Operating system package or component

python3-immutables
Operating systems & Components / Operating system package or component

python-immutables-debugsource
Operating systems & Components / Operating system package or component

prometheus-blackbox_exporter-debuginfo
Operating systems & Components / Operating system package or component

prometheus-blackbox_exporter
Operating systems & Components / Operating system package or component

grafana
Operating systems & Components / Operating system package or component

golang-github-prometheus-prometheus
Operating systems & Components / Operating system package or component

system-user-prometheus
Operating systems & Components / Operating system package or component

system-user-grafana
Operating systems & Components / Operating system package or component

mgr-osad
Operating systems & Components / Operating system package or component

mgr-custom-info
Operating systems & Components / Operating system package or component

mgr-cfg-management
Operating systems & Components / Operating system package or component

mgr-cfg-client
Operating systems & Components / Operating system package or component

mgr-cfg-actions
Operating systems & Components / Operating system package or component

mgr-cfg
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Exposure of Resource to Wrong Sphere

EUVDB-ID: #VU58294

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-21996

CWE-ID: N/A

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Salt download URL. A local user with control over the file source URL and its source_hash URL can gain full file system access as root on a salt minion.

Mitigation

Update the affected package Security Beta update for SUMA client tools to the latest version.

Vulnerable software versions

zypp-plugin-spacewalk: before 1.0.10-6.15.1

suseRegisterInfo: before 4.3.1-6.15.2

supportutils-plugin-susemanager-client: before 4.3.1-6.12.2

spacewalk-remote-utils: before 4.3.1-6.9.2

spacewalk-oscap: before 4.3.1-6.9.2

spacewalk-koan: before 4.3.1-6.9.2

spacewalk-client-tools: before 4.3.4-6.33.3

spacewalk-client-setup: before 4.3.4-6.33.3

spacewalk-check: before 4.3.4-6.33.3

spacecmd: before 4.3.4-6.27.1

salt-zsh-completion: before 3003.3-8.44.1

salt-fish-completion: before 3003.3-8.44.1

salt-bash-completion: before 3003.3-8.44.1

python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1

python3-suseRegisterInfo: before 4.3.1-6.15.2

python3-spacewalk-oscap: before 4.3.1-6.9.2

python3-spacewalk-koan: before 4.3.1-6.9.2

python3-spacewalk-client-tools: before 4.3.4-6.33.3

python3-spacewalk-client-setup: before 4.3.4-6.33.3

python3-spacewalk-check: before 4.3.4-6.33.3

python3-rhnlib: before 4.3.1-6.18.2

python3-mgr-virtualization-host: before 4.3.1-4.9.3

python3-mgr-virtualization-common: before 4.3.1-4.9.3

python3-mgr-push: before 4.3.1-4.9.3

python3-mgr-osad: before 4.3.2-4.18.2

python3-mgr-osa-common: before 4.3.2-4.18.2

python3-mgr-cfg-management: before 4.3.2-4.15.1

python3-mgr-cfg-client: before 4.3.2-4.15.1

python3-mgr-cfg-actions: before 4.3.2-4.15.1

python3-mgr-cfg: before 4.3.2-4.15.1

python3-jabberpy: before 0.5-5.5.1

python3-hwdata: before 2.3.5-5.7.1

python3-contextvars: before 2.4-3.3.1

mgr-virtualization-host: before 4.3.1-4.9.3

mgr-push: before 4.3.1-4.9.3

mgr-daemon: before 4.3.2-4.15.2

koan: before 3.0.1-7.12.1

hwdata: before 0.334-6.5.1

salt-standalone-formulas-configuration: before 3003.3-8.44.1

salt-ssh: before 3003.3-8.44.1

salt-proxy: before 3003.3-8.44.1

salt-minion: before 3003.3-8.44.1

salt-master: before 3003.3-8.44.1

salt-doc: before 3003.3-8.44.1

salt-cloud: before 3003.3-8.44.1

salt: before 3003.3-8.44.1

python3-uyuni-common-libs: before 4.3.1-3.21.2

python3-salt: before 3003.3-8.44.1

python3-immutables-debuginfo: before 0.11-3.3.1

python3-immutables: before 0.11-3.3.1

python-immutables-debugsource: before 0.11-3.3.1

prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2

prometheus-blackbox_exporter: before 0.19.0-3.3.2

grafana: before 7.5.7-4.15.3

golang-github-prometheus-prometheus: before 2.27.1-6.21.2

system-user-prometheus: before 1.0.0-3.5.1

system-user-grafana: before 1.0.0-3.5.1

mgr-osad: before 4.3.2-4.18.2

mgr-custom-info: before 4.3.2-4.9.1

mgr-cfg-management: before 4.3.2-4.15.1

mgr-cfg-client: before 4.3.2-4.15.1

mgr-cfg-actions: before 4.3.2-4.15.1

mgr-cfg: before 4.3.2-4.15.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Privilege Management

EUVDB-ID: #VU51579

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-27962

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges within the application.

The vulnerability exists due to improper privilege management. A remote user with Editor privileges can bypass data source permissions on the organization's default data source.

Mitigation

Update the affected package Security Beta update for SUMA client tools to the latest version.

Vulnerable software versions

zypp-plugin-spacewalk: before 1.0.10-6.15.1

suseRegisterInfo: before 4.3.1-6.15.2

supportutils-plugin-susemanager-client: before 4.3.1-6.12.2

spacewalk-remote-utils: before 4.3.1-6.9.2

spacewalk-oscap: before 4.3.1-6.9.2

spacewalk-koan: before 4.3.1-6.9.2

spacewalk-client-tools: before 4.3.4-6.33.3

spacewalk-client-setup: before 4.3.4-6.33.3

spacewalk-check: before 4.3.4-6.33.3

spacecmd: before 4.3.4-6.27.1

salt-zsh-completion: before 3003.3-8.44.1

salt-fish-completion: before 3003.3-8.44.1

salt-bash-completion: before 3003.3-8.44.1

python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1

python3-suseRegisterInfo: before 4.3.1-6.15.2

python3-spacewalk-oscap: before 4.3.1-6.9.2

python3-spacewalk-koan: before 4.3.1-6.9.2

python3-spacewalk-client-tools: before 4.3.4-6.33.3

python3-spacewalk-client-setup: before 4.3.4-6.33.3

python3-spacewalk-check: before 4.3.4-6.33.3

python3-rhnlib: before 4.3.1-6.18.2

python3-mgr-virtualization-host: before 4.3.1-4.9.3

python3-mgr-virtualization-common: before 4.3.1-4.9.3

python3-mgr-push: before 4.3.1-4.9.3

python3-mgr-osad: before 4.3.2-4.18.2

python3-mgr-osa-common: before 4.3.2-4.18.2

python3-mgr-cfg-management: before 4.3.2-4.15.1

python3-mgr-cfg-client: before 4.3.2-4.15.1

python3-mgr-cfg-actions: before 4.3.2-4.15.1

python3-mgr-cfg: before 4.3.2-4.15.1

python3-jabberpy: before 0.5-5.5.1

python3-hwdata: before 2.3.5-5.7.1

python3-contextvars: before 2.4-3.3.1

mgr-virtualization-host: before 4.3.1-4.9.3

mgr-push: before 4.3.1-4.9.3

mgr-daemon: before 4.3.2-4.15.2

koan: before 3.0.1-7.12.1

hwdata: before 0.334-6.5.1

salt-standalone-formulas-configuration: before 3003.3-8.44.1

salt-ssh: before 3003.3-8.44.1

salt-proxy: before 3003.3-8.44.1

salt-minion: before 3003.3-8.44.1

salt-master: before 3003.3-8.44.1

salt-doc: before 3003.3-8.44.1

salt-cloud: before 3003.3-8.44.1

salt: before 3003.3-8.44.1

python3-uyuni-common-libs: before 4.3.1-3.21.2

python3-salt: before 3003.3-8.44.1

python3-immutables-debuginfo: before 0.11-3.3.1

python3-immutables: before 0.11-3.3.1

python-immutables-debugsource: before 0.11-3.3.1

prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2

prometheus-blackbox_exporter: before 0.19.0-3.3.2

grafana: before 7.5.7-4.15.3

golang-github-prometheus-prometheus: before 2.27.1-6.21.2

system-user-prometheus: before 1.0.0-3.5.1

system-user-grafana: before 1.0.0-3.5.1

mgr-osad: before 4.3.2-4.18.2

mgr-custom-info: before 4.3.2-4.9.1

mgr-cfg-management: before 4.3.2-4.15.1

mgr-cfg-client: before 4.3.2-4.15.1

mgr-cfg-actions: before 4.3.2-4.15.1

mgr-cfg: before 4.3.2-4.15.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU51580

Risk: Medium

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-28146

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and add external groups to existing teams.

Mitigation

Update the affected package Security Beta update for SUMA client tools to the latest version.

Vulnerable software versions

zypp-plugin-spacewalk: before 1.0.10-6.15.1

suseRegisterInfo: before 4.3.1-6.15.2

supportutils-plugin-susemanager-client: before 4.3.1-6.12.2

spacewalk-remote-utils: before 4.3.1-6.9.2

spacewalk-oscap: before 4.3.1-6.9.2

spacewalk-koan: before 4.3.1-6.9.2

spacewalk-client-tools: before 4.3.4-6.33.3

spacewalk-client-setup: before 4.3.4-6.33.3

spacewalk-check: before 4.3.4-6.33.3

spacecmd: before 4.3.4-6.27.1

salt-zsh-completion: before 3003.3-8.44.1

salt-fish-completion: before 3003.3-8.44.1

salt-bash-completion: before 3003.3-8.44.1

python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1

python3-suseRegisterInfo: before 4.3.1-6.15.2

python3-spacewalk-oscap: before 4.3.1-6.9.2

python3-spacewalk-koan: before 4.3.1-6.9.2

python3-spacewalk-client-tools: before 4.3.4-6.33.3

python3-spacewalk-client-setup: before 4.3.4-6.33.3

python3-spacewalk-check: before 4.3.4-6.33.3

python3-rhnlib: before 4.3.1-6.18.2

python3-mgr-virtualization-host: before 4.3.1-4.9.3

python3-mgr-virtualization-common: before 4.3.1-4.9.3

python3-mgr-push: before 4.3.1-4.9.3

python3-mgr-osad: before 4.3.2-4.18.2

python3-mgr-osa-common: before 4.3.2-4.18.2

python3-mgr-cfg-management: before 4.3.2-4.15.1

python3-mgr-cfg-client: before 4.3.2-4.15.1

python3-mgr-cfg-actions: before 4.3.2-4.15.1

python3-mgr-cfg: before 4.3.2-4.15.1

python3-jabberpy: before 0.5-5.5.1

python3-hwdata: before 2.3.5-5.7.1

python3-contextvars: before 2.4-3.3.1

mgr-virtualization-host: before 4.3.1-4.9.3

mgr-push: before 4.3.1-4.9.3

mgr-daemon: before 4.3.2-4.15.2

koan: before 3.0.1-7.12.1

hwdata: before 0.334-6.5.1

salt-standalone-formulas-configuration: before 3003.3-8.44.1

salt-ssh: before 3003.3-8.44.1

salt-proxy: before 3003.3-8.44.1

salt-minion: before 3003.3-8.44.1

salt-master: before 3003.3-8.44.1

salt-doc: before 3003.3-8.44.1

salt-cloud: before 3003.3-8.44.1

salt: before 3003.3-8.44.1

python3-uyuni-common-libs: before 4.3.1-3.21.2

python3-salt: before 3003.3-8.44.1

python3-immutables-debuginfo: before 0.11-3.3.1

python3-immutables: before 0.11-3.3.1

python-immutables-debugsource: before 0.11-3.3.1

prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2

prometheus-blackbox_exporter: before 0.19.0-3.3.2

grafana: before 7.5.7-4.15.3

golang-github-prometheus-prometheus: before 2.27.1-6.21.2

system-user-prometheus: before 1.0.0-3.5.1

system-user-grafana: before 1.0.0-3.5.1

mgr-osad: before 4.3.2-4.18.2

mgr-custom-info: before 4.3.2-4.9.1

mgr-cfg-management: before 4.3.2-4.15.1

mgr-cfg-client: before 4.3.2-4.15.1

mgr-cfg-actions: before 4.3.2-4.15.1

mgr-cfg: before 4.3.2-4.15.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper access control

EUVDB-ID: #VU51581

Risk: Medium

CVSSv4.0: 1.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-28147

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions, when editorsCanAdmin  feature is enabled. A remote user can bypass implemented security restrictions and add external group members to existing teams.

Mitigation

Update the affected package Security Beta update for SUMA client tools to the latest version.

Vulnerable software versions

zypp-plugin-spacewalk: before 1.0.10-6.15.1

suseRegisterInfo: before 4.3.1-6.15.2

supportutils-plugin-susemanager-client: before 4.3.1-6.12.2

spacewalk-remote-utils: before 4.3.1-6.9.2

spacewalk-oscap: before 4.3.1-6.9.2

spacewalk-koan: before 4.3.1-6.9.2

spacewalk-client-tools: before 4.3.4-6.33.3

spacewalk-client-setup: before 4.3.4-6.33.3

spacewalk-check: before 4.3.4-6.33.3

spacecmd: before 4.3.4-6.27.1

salt-zsh-completion: before 3003.3-8.44.1

salt-fish-completion: before 3003.3-8.44.1

salt-bash-completion: before 3003.3-8.44.1

python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1

python3-suseRegisterInfo: before 4.3.1-6.15.2

python3-spacewalk-oscap: before 4.3.1-6.9.2

python3-spacewalk-koan: before 4.3.1-6.9.2

python3-spacewalk-client-tools: before 4.3.4-6.33.3

python3-spacewalk-client-setup: before 4.3.4-6.33.3

python3-spacewalk-check: before 4.3.4-6.33.3

python3-rhnlib: before 4.3.1-6.18.2

python3-mgr-virtualization-host: before 4.3.1-4.9.3

python3-mgr-virtualization-common: before 4.3.1-4.9.3

python3-mgr-push: before 4.3.1-4.9.3

python3-mgr-osad: before 4.3.2-4.18.2

python3-mgr-osa-common: before 4.3.2-4.18.2

python3-mgr-cfg-management: before 4.3.2-4.15.1

python3-mgr-cfg-client: before 4.3.2-4.15.1

python3-mgr-cfg-actions: before 4.3.2-4.15.1

python3-mgr-cfg: before 4.3.2-4.15.1

python3-jabberpy: before 0.5-5.5.1

python3-hwdata: before 2.3.5-5.7.1

python3-contextvars: before 2.4-3.3.1

mgr-virtualization-host: before 4.3.1-4.9.3

mgr-push: before 4.3.1-4.9.3

mgr-daemon: before 4.3.2-4.15.2

koan: before 3.0.1-7.12.1

hwdata: before 0.334-6.5.1

salt-standalone-formulas-configuration: before 3003.3-8.44.1

salt-ssh: before 3003.3-8.44.1

salt-proxy: before 3003.3-8.44.1

salt-minion: before 3003.3-8.44.1

salt-master: before 3003.3-8.44.1

salt-doc: before 3003.3-8.44.1

salt-cloud: before 3003.3-8.44.1

salt: before 3003.3-8.44.1

python3-uyuni-common-libs: before 4.3.1-3.21.2

python3-salt: before 3003.3-8.44.1

python3-immutables-debuginfo: before 0.11-3.3.1

python3-immutables: before 0.11-3.3.1

python-immutables-debugsource: before 0.11-3.3.1

prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2

prometheus-blackbox_exporter: before 0.19.0-3.3.2

grafana: before 7.5.7-4.15.3

golang-github-prometheus-prometheus: before 2.27.1-6.21.2

system-user-prometheus: before 1.0.0-3.5.1

system-user-grafana: before 1.0.0-3.5.1

mgr-osad: before 4.3.2-4.18.2

mgr-custom-info: before 4.3.2-4.9.1

mgr-cfg-management: before 4.3.2-4.15.1

mgr-cfg-client: before 4.3.2-4.15.1

mgr-cfg-actions: before 4.3.2-4.15.1

mgr-cfg: before 4.3.2-4.15.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper control of interaction frequency

EUVDB-ID: #VU51582

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-28148

CWE-ID: CWE-799 - Improper Control of Interaction Frequency

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to absent control of interaction frequency within the HTTP API endpoint for insights usage. A remote non-authenticated attacker send multiple HTTP requests and perform a denial of service (DoS) attack.

Mitigation

Update the affected package Security Beta update for SUMA client tools to the latest version.

Vulnerable software versions

zypp-plugin-spacewalk: before 1.0.10-6.15.1

suseRegisterInfo: before 4.3.1-6.15.2

supportutils-plugin-susemanager-client: before 4.3.1-6.12.2

spacewalk-remote-utils: before 4.3.1-6.9.2

spacewalk-oscap: before 4.3.1-6.9.2

spacewalk-koan: before 4.3.1-6.9.2

spacewalk-client-tools: before 4.3.4-6.33.3

spacewalk-client-setup: before 4.3.4-6.33.3

spacewalk-check: before 4.3.4-6.33.3

spacecmd: before 4.3.4-6.27.1

salt-zsh-completion: before 3003.3-8.44.1

salt-fish-completion: before 3003.3-8.44.1

salt-bash-completion: before 3003.3-8.44.1

python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1

python3-suseRegisterInfo: before 4.3.1-6.15.2

python3-spacewalk-oscap: before 4.3.1-6.9.2

python3-spacewalk-koan: before 4.3.1-6.9.2

python3-spacewalk-client-tools: before 4.3.4-6.33.3

python3-spacewalk-client-setup: before 4.3.4-6.33.3

python3-spacewalk-check: before 4.3.4-6.33.3

python3-rhnlib: before 4.3.1-6.18.2

python3-mgr-virtualization-host: before 4.3.1-4.9.3

python3-mgr-virtualization-common: before 4.3.1-4.9.3

python3-mgr-push: before 4.3.1-4.9.3

python3-mgr-osad: before 4.3.2-4.18.2

python3-mgr-osa-common: before 4.3.2-4.18.2

python3-mgr-cfg-management: before 4.3.2-4.15.1

python3-mgr-cfg-client: before 4.3.2-4.15.1

python3-mgr-cfg-actions: before 4.3.2-4.15.1

python3-mgr-cfg: before 4.3.2-4.15.1

python3-jabberpy: before 0.5-5.5.1

python3-hwdata: before 2.3.5-5.7.1

python3-contextvars: before 2.4-3.3.1

mgr-virtualization-host: before 4.3.1-4.9.3

mgr-push: before 4.3.1-4.9.3

mgr-daemon: before 4.3.2-4.15.2

koan: before 3.0.1-7.12.1

hwdata: before 0.334-6.5.1

salt-standalone-formulas-configuration: before 3003.3-8.44.1

salt-ssh: before 3003.3-8.44.1

salt-proxy: before 3003.3-8.44.1

salt-minion: before 3003.3-8.44.1

salt-master: before 3003.3-8.44.1

salt-doc: before 3003.3-8.44.1

salt-cloud: before 3003.3-8.44.1

salt: before 3003.3-8.44.1

python3-uyuni-common-libs: before 4.3.1-3.21.2

python3-salt: before 3003.3-8.44.1

python3-immutables-debuginfo: before 0.11-3.3.1

python3-immutables: before 0.11-3.3.1

python-immutables-debugsource: before 0.11-3.3.1

prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2

prometheus-blackbox_exporter: before 0.19.0-3.3.2

grafana: before 7.5.7-4.15.3

golang-github-prometheus-prometheus: before 2.27.1-6.21.2

system-user-prometheus: before 1.0.0-3.5.1

system-user-grafana: before 1.0.0-3.5.1

mgr-osad: before 4.3.2-4.18.2

mgr-custom-info: before 4.3.2-4.9.1

mgr-cfg-management: before 4.3.2-4.15.1

mgr-cfg-client: before 4.3.2-4.15.1

mgr-cfg-actions: before 4.3.2-4.15.1

mgr-cfg: before 4.3.2-4.15.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Open redirect

EUVDB-ID: #VU53343

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-29622

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.

Mitigation

Update the affected package Security Beta update for SUMA client tools to the latest version.

Vulnerable software versions

zypp-plugin-spacewalk: before 1.0.10-6.15.1

suseRegisterInfo: before 4.3.1-6.15.2

supportutils-plugin-susemanager-client: before 4.3.1-6.12.2

spacewalk-remote-utils: before 4.3.1-6.9.2

spacewalk-oscap: before 4.3.1-6.9.2

spacewalk-koan: before 4.3.1-6.9.2

spacewalk-client-tools: before 4.3.4-6.33.3

spacewalk-client-setup: before 4.3.4-6.33.3

spacewalk-check: before 4.3.4-6.33.3

spacecmd: before 4.3.4-6.27.1

salt-zsh-completion: before 3003.3-8.44.1

salt-fish-completion: before 3003.3-8.44.1

salt-bash-completion: before 3003.3-8.44.1

python3-zypp-plugin-spacewalk: before 1.0.10-6.15.1

python3-suseRegisterInfo: before 4.3.1-6.15.2

python3-spacewalk-oscap: before 4.3.1-6.9.2

python3-spacewalk-koan: before 4.3.1-6.9.2

python3-spacewalk-client-tools: before 4.3.4-6.33.3

python3-spacewalk-client-setup: before 4.3.4-6.33.3

python3-spacewalk-check: before 4.3.4-6.33.3

python3-rhnlib: before 4.3.1-6.18.2

python3-mgr-virtualization-host: before 4.3.1-4.9.3

python3-mgr-virtualization-common: before 4.3.1-4.9.3

python3-mgr-push: before 4.3.1-4.9.3

python3-mgr-osad: before 4.3.2-4.18.2

python3-mgr-osa-common: before 4.3.2-4.18.2

python3-mgr-cfg-management: before 4.3.2-4.15.1

python3-mgr-cfg-client: before 4.3.2-4.15.1

python3-mgr-cfg-actions: before 4.3.2-4.15.1

python3-mgr-cfg: before 4.3.2-4.15.1

python3-jabberpy: before 0.5-5.5.1

python3-hwdata: before 2.3.5-5.7.1

python3-contextvars: before 2.4-3.3.1

mgr-virtualization-host: before 4.3.1-4.9.3

mgr-push: before 4.3.1-4.9.3

mgr-daemon: before 4.3.2-4.15.2

koan: before 3.0.1-7.12.1

hwdata: before 0.334-6.5.1

salt-standalone-formulas-configuration: before 3003.3-8.44.1

salt-ssh: before 3003.3-8.44.1

salt-proxy: before 3003.3-8.44.1

salt-minion: before 3003.3-8.44.1

salt-master: before 3003.3-8.44.1

salt-doc: before 3003.3-8.44.1

salt-cloud: before 3003.3-8.44.1

salt: before 3003.3-8.44.1

python3-uyuni-common-libs: before 4.3.1-3.21.2

python3-salt: before 3003.3-8.44.1

python3-immutables-debuginfo: before 0.11-3.3.1

python3-immutables: before 0.11-3.3.1

python-immutables-debugsource: before 0.11-3.3.1

prometheus-blackbox_exporter-debuginfo: before 0.19.0-3.3.2

prometheus-blackbox_exporter: before 0.19.0-3.3.2

grafana: before 7.5.7-4.15.3

golang-github-prometheus-prometheus: before 2.27.1-6.21.2

system-user-prometheus: before 1.0.0-3.5.1

system-user-grafana: before 1.0.0-3.5.1

mgr-osad: before 4.3.2-4.18.2

mgr-custom-info: before 4.3.2-4.9.1

mgr-cfg-management: before 4.3.2-4.15.1

mgr-cfg-client: before 4.3.2-4.15.1

mgr-cfg-actions: before 4.3.2-4.15.1

mgr-cfg: before 4.3.2-4.15.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213908-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###