Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2019-11287 CVE-2020-1734 CVE-2021-39226 CVE-2021-44716 CVE-2022-24790 CVE-2022-28346 CVE-2022-34265 |
CWE-ID | CWE-20 CWE-78 CWE-284 CWE-444 CWE-89 |
Exploitation vector | Network |
Public exploit |
Vulnerability #3 is being exploited in the wild. Public exploit code for vulnerability #6 is available. Public exploit code for vulnerability #7 is available. |
Vulnerable software |
SUSE OpenStack Cloud Crowbar Operating systems & Components / Operating system HPE Helion Openstack Operating systems & Components / Operating system SUSE OpenStack Cloud Operating systems & Components / Operating system venv-openstack-horizon-hpe-x86_64 Operating systems & Components / Operating system package or component venv-openstack-murano-x86_64 Operating systems & Components / Operating system package or component venv-openstack-horizon-x86_64 Operating systems & Components / Operating system package or component venv-openstack-heat-x86_64 Operating systems & Components / Operating system package or component ardana-cobbler Operating systems & Components / Operating system package or component ardana-ansible Operating systems & Components / Operating system package or component python-murano Operating systems & Components / Operating system package or component python-Django Operating systems & Components / Operating system package or component openstack-murano-engine Operating systems & Components / Operating system package or component openstack-murano-doc Operating systems & Components / Operating system package or component openstack-murano-api Operating systems & Components / Operating system package or component openstack-murano Operating systems & Components / Operating system package or component openstack-heat-templates Operating systems & Components / Operating system package or component rubygem-puma-debugsource Operating systems & Components / Operating system package or component ruby2.1-rubygem-puma-debuginfo Operating systems & Components / Operating system package or component ruby2.1-rubygem-puma Operating systems & Components / Operating system package or component rabbitmq-server-plugins Operating systems & Components / Operating system package or component rabbitmq-server Operating systems & Components / Operating system package or component grafana-debuginfo Operating systems & Components / Operating system package or component grafana Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU24218
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-11287
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input passed via the "X-Reason" HTTP Header. A remote attacker can inject a malicious Erlang format string into the "X-Reason" HTTP Header that once expanded will consume the heap, resulting in the server crashing.
MitigationUpdate the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67588
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-1734
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the pipe lookup plugin of ansible. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Update the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57320
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]
CVE-ID: CVE-2021-39226
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions to database snapshots. Remote unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey.
Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss.
MitigationUpdate the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU58824
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-44716
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61798
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-24790
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to preform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
MitigationUpdate the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62050
Risk: High
CVSSv4.0: 8.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2022-28346
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within the QuerySet.annotate(), aggregate(), and extra() methods. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
MitigationUpdate the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU64905
Risk: High
CVSSv4.0: 8.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2022-34265
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within Trunc(kind) and Extract(lookup_name) arguments. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
MitigationUpdate the affected package ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 8
HPE Helion Openstack: 8
SUSE OpenStack Cloud: 8
venv-openstack-horizon-hpe-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-murano-x86_64: before 4.0.2~dev3-12.38.1
venv-openstack-horizon-x86_64: before 12.0.5~dev6-14.48.1
venv-openstack-heat-x86_64: before 9.0.8~dev22-12.45.1
ardana-cobbler: before 8.0+git.1660773402.d845a45-3.47.1
ardana-ansible: before 8.0+git.1660773729.3789a6d-3.85.1
python-murano: before 4.0.2~dev3-3.12.1
python-Django: before 1.11.29-3.42.1
openstack-murano-engine: before 4.0.2~dev3-3.12.1
openstack-murano-doc: before 4.0.2~dev3-3.12.1
openstack-murano-api: before 4.0.2~dev3-3.12.1
openstack-murano: before 4.0.2~dev3-3.12.1
openstack-heat-templates: before 0.0.0+git.1654529662.75fa04a-3.27.1
rubygem-puma-debugsource: before 2.16.0-3.18.1
ruby2.1-rubygem-puma-debuginfo: before 2.16.0-3.18.1
ruby2.1-rubygem-puma: before 2.16.0-3.18.1
rabbitmq-server-plugins: before 3.6.16-3.13.1
rabbitmq-server: before 3.6.16-3.13.1
grafana-debuginfo: before 6.7.4-4.23.1
grafana: before 6.7.4-4.23.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223338-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.