OpenSUSE Linux update for SUSE Manager Client Tools



Published: 2020-07-28 | Updated: 2022-07-18
Risk High
Patch available YES
Number of vulnerabilities 31
CVE-ID CVE-2019-10254
CVE-2019-10206
CVE-2019-10217
CVE-2019-10207
CVE-2019-10241
CVE-2019-1020007
CVE-2019-10247
CVE-2019-10227
CVE-2019-10213
CVE-2019-10224
CVE-2019-10215
CVE-2019-10218
CVE-2019-10281
CVE-2019-10202
CVE-2019-10212
CVE-2019-10214
CVE-2019-10253
CVE-2019-10222
CVE-2019-10201
CVE-2019-10216
CVE-2019-10211
CVE-2019-10210
CVE-2019-10209
CVE-2019-10208
CVE-2019-10269
CVE-2019-1020014
CVE-2019-1023
CVE-2019-1024
CVE-2019-15043
CVE-2020-12245
CVE-2020-13379
CWE-ID CWE-79
CWE-20
CWE-200
CWE-476
CWE-312
CWE-22
CWE-532
CWE-319
CWE-352
CWE-399
CWE-287
CWE-264
CWE-426
CWE-256
CWE-121
CWE-415
CWE-125
CWE-119
CWE-284
CWE-918
Exploitation vector Network
Public exploit Public exploit code for vulnerability #17 is available.
Public exploit code for vulnerability #29 is available.
Public exploit code for vulnerability #31 is available.
Vulnerable software
Subscribe
Opensuse
Operating systems & Components / Operating system

Vendor Novell

Security Bulletin

This security bulletin contains information about 31 vulnerabilities.

1) Cross-site scripting

EUVDB-ID: #VU31136

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10254

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

In MISP before 2.4.105, the app/View/Layouts/default.ctp default layout template has a Reflected XSS vulnerability.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Input validation error

EUVDB-ID: #VU30585

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-10206

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to gain access to sensitive information.

ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Information disclosure

EUVDB-ID: #VU30582

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-10217

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to gain access to sensitive information.

A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) NULL pointer dereference

EUVDB-ID: #VU28401

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10207

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Cross-site scripting

EUVDB-ID: #VU26320

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10241

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Cross-site scripting

EUVDB-ID: #VU25496

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-1020007

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Improper input validation

EUVDB-ID: #VU25067

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-10247

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Integrator Acquistion System (Eclipse Jetty) component in Oracle Endeca Information Discovery Integrator. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Cross-site scripting

EUVDB-ID: #VU23889

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10227

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "404-not-found" component. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Cleartext storage of sensitive information

EUVDB-ID: #VU23399

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10213

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to OpenShift Container Platform writes secrets in clear text into pod logs when the log level in a given operator is set to Debug or higher. A local user can read the log files and gain access to sensitive information.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Information disclosure

EUVDB-ID: #VU23001

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10224

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists within the dscreate and dsconf commands in 389-ds-base due to excessive data output, when executed in verbose mode. A local user can gain access to sensitive information, such as the Directory Manager password.

Successful exploitation of the vulnerability requires that the attacker can see the screen or record terminal session.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Cross-site scripting

EUVDB-ID: #VU22823

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10215

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the highlighter() function in Bootstrap-3-Typeahead. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Path traversal

EUVDB-ID: #VU22329

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-10218

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in filenames within Samba client code (libsmbclient). A malicious SMB server can return a filename to the client containing directory traversal characters and force the client to read or write data to local files.

Successful exploitation of the vulnerability may allow an attacker to overwrite arbitrary files on the client.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Cleartext storage of sensitive information

EUVDB-ID: #VU21560

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10281

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a local user to view the password on the target system.

The vulnerability exists due to the affected software stores credentials unencrypted in its
global configuration file "org.jenkinsci.plugins.relution_publisher.configuration.global.StoreConfiguration.xml" on the Jenkins master. A local authenticated user with access to the master file system can obtain credentials.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Input validation error

EUVDB-ID: #VU21470

Risk: High

CVSSv3.1:

CVE-ID: CVE-2019-10202

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to incorrect implementation of patch for Codehaus 1.9.x against insufficient data deserialization present in FasterXML jackson-databind. A remote attacker can bypass implemented protection measures and exploit known deserialization vulnerabilities in jackson-databind package.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU21469

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10212

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists in Undertow DEBUG log implementation for io.undertow.request.security that stored user's credentials in plain text in a world-readable file. A local user can view contents of the debug file and gain access to login and passwords of Undertow users.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

16) Cleartext transmission of sensitive information

EUVDB-ID: #VU21141

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10214

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to containers/image library library does not enforce TLS connection by default. A remote attacker with ability to perform MitM attack can gain accecss to sensitive information.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

17) Cross-site request forgery

EUVDB-ID: #VU20843

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10253

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin within the handling of request to “DomainObjectDocumentUpload.ashx” application. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.


Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

18) Resource management error

EUVDB-ID: #VU20465

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-10222

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to failure in the RADOS gateway implementation when handing client disconnects. A remote authenticated attacker can abuse this error and perform denial of service attack.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

19) Improper Authentication

EUVDB-ID: #VU20413

Risk: High

CVSSv3.1:

CVE-ID: CVE-2019-10201

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the Security Assertion Markup Language (SAML) broker does not properly parse messages. A remote attacker can send a specially crafted SAML request, bypass authentication process and gain unauthorized access to the application.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

20) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU20059

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10216

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to access arbitrary files on the system.

The vulnerability exists due to an error within the .buildfont1 procedure when making privileged secure calls. A remote attacker can create a specially crafted PostScript file, trick the victim into opening it, bypass the ‘-dSAFER’ restrictions and access arbitrary file on the system.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

21) Untrusted search path

EUVDB-ID: #VU20006

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10211

CWE-ID: CWE-426 - Untrusted Search Path

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to EnterpriseDB Windows installer bundles an OpenSSL library that tries to load configuration from a hard-coded location on the system. This location usually does not exists, therefore an attacker can create a folder, place malicious configuration file in it and execute the configuration.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

22) Unprotected storage of credentials

EUVDB-ID: #VU20005

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10210

CWE-ID: CWE-256 - Unprotected Storage of Credentials

Exploit availability: No

Description

The vulnerability allows a local user to access credentials in plain text.
The vulnerability exists due to EnterpriseDB Windows installer writes a password to a temporary file in its installation directory, creates initial databases, and deletes the file. During those seconds while the file exists, a local user can read the PostgreSQL superuser password from the file.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

23) Information disclosure

EUVDB-ID: #VU20004

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10209

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to way PostgreSQL processes user-defined hash equality operators. A remote attacker can under certain circumstances read arbitrary bytes from server memory.

Note, exploitation of this vulnerability requires a superuser to create unusual operators.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

24) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU20003

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-10208

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to way PostreSQL processes SECURITY DEFINER functions. A privileged attacker with EXECUTE permission, which must itself contain a function call having inexact argument type match, can execute arbitrary SQL query under the identity of the function owner.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

25) Stack-based buffer overflow

EUVDB-ID: #VU19976

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-10269

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the bns_restore function in bntseq.c via a long sequence name in a .alt file. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

26) Double Free

EUVDB-ID: #VU19934

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-1020014

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local attacker to access sensitive information on a targeted system.

The vulnerability exists due to a double free condition in the list functions. A local authenticated attacker can trigger double free error and gain access to sensitive information on a targeted system

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

27) Out-of-bounds read

EUVDB-ID: #VU18764

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-1023

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the way the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can use a specially crafted web page to trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

28) Buffer overflow

EUVDB-ID: #VU18756

Risk: High

CVSSv3.1:

CVE-ID: CVE-2019-1024

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the Chakra scripting engine. A remote attacker can create a specially crafted webpage, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

29) Improper access control

EUVDB-ID: #VU20497

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-15043

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions to Grafana HTTP API. A remote non-authenticated attacker can send a specially crafted request to unprotected Garafa API endpoint and perform denial of service (DoS) attack.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

30) Cross-site scripting

EUVDB-ID: #VU27396

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-12245

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via column.title or cellLinkTooltip. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

31) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU28581

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-13379

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: Yes

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input within the avatar feature. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.2


CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###