SUSE update for SUSE Manager Server 4.2



Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-31255
CVE-2022-43753
CVE-2022-43754
CWE-ID CWE-22
CWE-79
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Vulnerable software
SUSE Linux Enterprise Module for SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

uyuni-config-modules
Operating systems & Components / Operating system package or component

susemanager-sls
Operating systems & Components / Operating system package or component

susemanager-schema
Operating systems & Components / Operating system package or component

susemanager-docs_en-pdf
Operating systems & Components / Operating system package or component

susemanager-docs_en
Operating systems & Components / Operating system package or component

susemanager-doc-indexes
Operating systems & Components / Operating system package or component

spacewalk-utils-extras
Operating systems & Components / Operating system package or component

spacewalk-utils
Operating systems & Components / Operating system package or component

spacewalk-taskomatic
Operating systems & Components / Operating system package or component

spacewalk-java-postgresql
Operating systems & Components / Operating system package or component

spacewalk-java-lib
Operating systems & Components / Operating system package or component

spacewalk-java-config
Operating systems & Components / Operating system package or component

spacewalk-java
Operating systems & Components / Operating system package or component

spacewalk-html
Operating systems & Components / Operating system package or component

spacewalk-client-tools
Operating systems & Components / Operating system package or component

spacewalk-base-minimal-config
Operating systems & Components / Operating system package or component

spacewalk-base-minimal
Operating systems & Components / Operating system package or component

spacewalk-base
Operating systems & Components / Operating system package or component

spacewalk-backend-xmlrpc
Operating systems & Components / Operating system package or component

spacewalk-backend-xml-export-libs
Operating systems & Components / Operating system package or component

spacewalk-backend-tools
Operating systems & Components / Operating system package or component

spacewalk-backend-sql-postgresql
Operating systems & Components / Operating system package or component

spacewalk-backend-sql
Operating systems & Components / Operating system package or component

spacewalk-backend-server
Operating systems & Components / Operating system package or component

spacewalk-backend-package-push-server
Operating systems & Components / Operating system package or component

spacewalk-backend-iss-export
Operating systems & Components / Operating system package or component

spacewalk-backend-iss
Operating systems & Components / Operating system package or component

spacewalk-backend-config-files-tool
Operating systems & Components / Operating system package or component

spacewalk-backend-config-files-common
Operating systems & Components / Operating system package or component

spacewalk-backend-config-files
Operating systems & Components / Operating system package or component

spacewalk-backend-applet
Operating systems & Components / Operating system package or component

spacewalk-backend-app
Operating systems & Components / Operating system package or component

spacewalk-backend
Operating systems & Components / Operating system package or component

spacecmd
Operating systems & Components / Operating system package or component

python3-urlgrabber
Operating systems & Components / Operating system package or component

python3-spacewalk-client-tools
Operating systems & Components / Operating system package or component

py27-compat-salt
Operating systems & Components / Operating system package or component

locale-formula
Operating systems & Components / Operating system package or component

susemanager-tools
Operating systems & Components / Operating system package or component

susemanager
Operating systems & Components / Operating system package or component

inter-server-sync-debuginfo
Operating systems & Components / Operating system package or component

inter-server-sync
Operating systems & Components / Operating system package or component

hub-xmlrpc-api
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Path traversal

EUVDB-ID: #VU69062

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2022-31255

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: Yes

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user  can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation

Update the affected package SUSE Manager Server 4.2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for SUSE Manager Server: 4.2

SUSE Manager Server: 4.2

uyuni-config-modules: before 4.2.28-150300.3.36.2

susemanager-sls: before 4.2.28-150300.3.36.2

susemanager-schema: before 4.2.25-150300.3.30.3

susemanager-docs_en-pdf: before 4.2-150300.12.36.2

susemanager-docs_en: before 4.2-150300.12.36.2

susemanager-doc-indexes: before 4.2-150300.12.36.3

spacewalk-utils-extras: before 4.2.18-150300.3.21.2

spacewalk-utils: before 4.2.18-150300.3.21.2

spacewalk-taskomatic: before 4.2.43-150300.3.48.2

spacewalk-java-postgresql: before 4.2.43-150300.3.48.2

spacewalk-java-lib: before 4.2.43-150300.3.48.2

spacewalk-java-config: before 4.2.43-150300.3.48.2

spacewalk-java: before 4.2.43-150300.3.48.2

spacewalk-html: before 4.2.30-150300.3.30.3

spacewalk-client-tools: before 4.2.21-150300.4.27.3

spacewalk-base-minimal-config: before 4.2.30-150300.3.30.3

spacewalk-base-minimal: before 4.2.30-150300.3.30.3

spacewalk-base: before 4.2.30-150300.3.30.3

spacewalk-backend-xmlrpc: before 4.2.25-150300.4.32.4

spacewalk-backend-xml-export-libs: before 4.2.25-150300.4.32.4

spacewalk-backend-tools: before 4.2.25-150300.4.32.4

spacewalk-backend-sql-postgresql: before 4.2.25-150300.4.32.4

spacewalk-backend-sql: before 4.2.25-150300.4.32.4

spacewalk-backend-server: before 4.2.25-150300.4.32.4

spacewalk-backend-package-push-server: before 4.2.25-150300.4.32.4

spacewalk-backend-iss-export: before 4.2.25-150300.4.32.4

spacewalk-backend-iss: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files-tool: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files-common: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files: before 4.2.25-150300.4.32.4

spacewalk-backend-applet: before 4.2.25-150300.4.32.4

spacewalk-backend-app: before 4.2.25-150300.4.32.4

spacewalk-backend: before 4.2.25-150300.4.32.4

spacecmd: before 4.2.20-150300.4.30.2

python3-urlgrabber: before 3.10.2.1py2_3-150300.3.3.2

python3-spacewalk-client-tools: before 4.2.21-150300.4.27.3

py27-compat-salt: before 3000.3-150300.7.7.26.2

locale-formula: before 0.3-150300.3.3.2

susemanager-tools: before 4.2.38-150300.3.44.3

susemanager: before 4.2.38-150300.3.44.3

inter-server-sync-debuginfo: before 0.2.4-150300.8.25.2

inter-server-sync: before 0.2.4-150300.8.25.2

hub-xmlrpc-api: before 0.7-150300.3.9.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2022/suse-su-20223878-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Path traversal

EUVDB-ID: #VU69063

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2022-43753

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: Yes

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation

Update the affected package SUSE Manager Server 4.2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for SUSE Manager Server: 4.2

SUSE Manager Server: 4.2

uyuni-config-modules: before 4.2.28-150300.3.36.2

susemanager-sls: before 4.2.28-150300.3.36.2

susemanager-schema: before 4.2.25-150300.3.30.3

susemanager-docs_en-pdf: before 4.2-150300.12.36.2

susemanager-docs_en: before 4.2-150300.12.36.2

susemanager-doc-indexes: before 4.2-150300.12.36.3

spacewalk-utils-extras: before 4.2.18-150300.3.21.2

spacewalk-utils: before 4.2.18-150300.3.21.2

spacewalk-taskomatic: before 4.2.43-150300.3.48.2

spacewalk-java-postgresql: before 4.2.43-150300.3.48.2

spacewalk-java-lib: before 4.2.43-150300.3.48.2

spacewalk-java-config: before 4.2.43-150300.3.48.2

spacewalk-java: before 4.2.43-150300.3.48.2

spacewalk-html: before 4.2.30-150300.3.30.3

spacewalk-client-tools: before 4.2.21-150300.4.27.3

spacewalk-base-minimal-config: before 4.2.30-150300.3.30.3

spacewalk-base-minimal: before 4.2.30-150300.3.30.3

spacewalk-base: before 4.2.30-150300.3.30.3

spacewalk-backend-xmlrpc: before 4.2.25-150300.4.32.4

spacewalk-backend-xml-export-libs: before 4.2.25-150300.4.32.4

spacewalk-backend-tools: before 4.2.25-150300.4.32.4

spacewalk-backend-sql-postgresql: before 4.2.25-150300.4.32.4

spacewalk-backend-sql: before 4.2.25-150300.4.32.4

spacewalk-backend-server: before 4.2.25-150300.4.32.4

spacewalk-backend-package-push-server: before 4.2.25-150300.4.32.4

spacewalk-backend-iss-export: before 4.2.25-150300.4.32.4

spacewalk-backend-iss: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files-tool: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files-common: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files: before 4.2.25-150300.4.32.4

spacewalk-backend-applet: before 4.2.25-150300.4.32.4

spacewalk-backend-app: before 4.2.25-150300.4.32.4

spacewalk-backend: before 4.2.25-150300.4.32.4

spacecmd: before 4.2.20-150300.4.30.2

python3-urlgrabber: before 3.10.2.1py2_3-150300.3.3.2

python3-spacewalk-client-tools: before 4.2.21-150300.4.27.3

py27-compat-salt: before 3000.3-150300.7.7.26.2

locale-formula: before 0.3-150300.3.3.2

susemanager-tools: before 4.2.38-150300.3.44.3

susemanager: before 4.2.38-150300.3.44.3

inter-server-sync-debuginfo: before 0.2.4-150300.8.25.2

inter-server-sync: before 0.2.4-150300.8.25.2

hub-xmlrpc-api: before 0.7-150300.3.9.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2022/suse-su-20223878-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

3) Cross-site scripting

EUVDB-ID: #VU69064

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-43754

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected package SUSE Manager Server 4.2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for SUSE Manager Server: 4.2

SUSE Manager Server: 4.2

uyuni-config-modules: before 4.2.28-150300.3.36.2

susemanager-sls: before 4.2.28-150300.3.36.2

susemanager-schema: before 4.2.25-150300.3.30.3

susemanager-docs_en-pdf: before 4.2-150300.12.36.2

susemanager-docs_en: before 4.2-150300.12.36.2

susemanager-doc-indexes: before 4.2-150300.12.36.3

spacewalk-utils-extras: before 4.2.18-150300.3.21.2

spacewalk-utils: before 4.2.18-150300.3.21.2

spacewalk-taskomatic: before 4.2.43-150300.3.48.2

spacewalk-java-postgresql: before 4.2.43-150300.3.48.2

spacewalk-java-lib: before 4.2.43-150300.3.48.2

spacewalk-java-config: before 4.2.43-150300.3.48.2

spacewalk-java: before 4.2.43-150300.3.48.2

spacewalk-html: before 4.2.30-150300.3.30.3

spacewalk-client-tools: before 4.2.21-150300.4.27.3

spacewalk-base-minimal-config: before 4.2.30-150300.3.30.3

spacewalk-base-minimal: before 4.2.30-150300.3.30.3

spacewalk-base: before 4.2.30-150300.3.30.3

spacewalk-backend-xmlrpc: before 4.2.25-150300.4.32.4

spacewalk-backend-xml-export-libs: before 4.2.25-150300.4.32.4

spacewalk-backend-tools: before 4.2.25-150300.4.32.4

spacewalk-backend-sql-postgresql: before 4.2.25-150300.4.32.4

spacewalk-backend-sql: before 4.2.25-150300.4.32.4

spacewalk-backend-server: before 4.2.25-150300.4.32.4

spacewalk-backend-package-push-server: before 4.2.25-150300.4.32.4

spacewalk-backend-iss-export: before 4.2.25-150300.4.32.4

spacewalk-backend-iss: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files-tool: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files-common: before 4.2.25-150300.4.32.4

spacewalk-backend-config-files: before 4.2.25-150300.4.32.4

spacewalk-backend-applet: before 4.2.25-150300.4.32.4

spacewalk-backend-app: before 4.2.25-150300.4.32.4

spacewalk-backend: before 4.2.25-150300.4.32.4

spacecmd: before 4.2.20-150300.4.30.2

python3-urlgrabber: before 3.10.2.1py2_3-150300.3.3.2

python3-spacewalk-client-tools: before 4.2.21-150300.4.27.3

py27-compat-salt: before 3000.3-150300.7.7.26.2

locale-formula: before 0.3-150300.3.3.2

susemanager-tools: before 4.2.38-150300.3.44.3

susemanager: before 4.2.38-150300.3.44.3

inter-server-sync-debuginfo: before 0.2.4-150300.8.25.2

inter-server-sync: before 0.2.4-150300.8.25.2

hub-xmlrpc-api: before 0.7-150300.3.9.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2022/suse-su-20223878-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###