Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU64572
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-31248
CWE-ID:
CWE-209 - Information Exposure Through an Error Message
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to enumerate email addresses of registered users.
The vulnerability exists due to the application in /rhn/help/ForgotCredentials.do exposes information about pretense of an email address of the registered user within the application. A remote non-authenticated attacker can enumerate email addresses of application users.
Update the affected package SUSE Manager Server 4.3 to the latest version.
Vulnerable software versionsSUSE Manager Server: 4.3
SUSE Linux Enterprise Module for SUSE Manager Server: 4.3
xmlpull-api: before 1.1.3.1-150400.3.3.1
woodstox: before 4.4.2-150400.3.3.1
virtual-host-gatherer-libcloud: before 1.0.23-150400.3.3.1
virtual-host-gatherer-VMware: before 1.0.23-150400.3.3.1
virtual-host-gatherer-Nutanix: before 1.0.23-150400.3.3.1
virtual-host-gatherer-Kubernetes: before 1.0.23-150400.3.3.1
virtual-host-gatherer: before 1.0.23-150400.3.3.1
uyuni-config-modules: before 4.3.24-150400.3.3.1
susemanager-sls: before 4.3.24-150400.3.3.1
susemanager-schema-utility: before 4.3.13-150400.3.3.3
susemanager-schema: before 4.3.13-150400.3.3.3
susemanager-retail-tools: before 1.0.1658330139.861779d-150400.3.3.1
susemanager-docs_en-pdf: before 4.3-150400.9.3.1
susemanager-docs_en: before 4.3-150400.9.3.1
susemanager-build-keys-web: before 15.4.3-150400.3.3.1
susemanager-build-keys: before 15.4.3-150400.3.3.1
subscription-matcher: before 0.29-150400.3.3.1
spacewalk-utils-extras: before 4.3.13-150400.3.3.3
spacewalk-utils: before 4.3.13-150400.3.3.3
spacewalk-taskomatic: before 4.3.35-150400.3.3.5
spacewalk-setup: before 4.3.10-150400.3.3.3
spacewalk-search: before 4.3.6-150400.3.3.3
spacewalk-postgresql: before 4.3.5-150400.3.3.2
spacewalk-java-postgresql: before 4.3.35-150400.3.3.5
spacewalk-java-lib: before 4.3.35-150400.3.3.5
spacewalk-java-config: before 4.3.35-150400.3.3.5
spacewalk-java: before 4.3.35-150400.3.3.5
spacewalk-html: before 4.3.23-150400.3.3.4
spacewalk-config: before 4.3.9-150400.3.3.3
spacewalk-common: before 4.3.5-150400.3.3.2
spacewalk-client-tools: before 4.3.11-150400.3.3.4
spacewalk-certs-tools: before 4.3.14-150400.3.3.2
spacewalk-base-minimal-config: before 4.3.23-150400.3.3.4
spacewalk-base-minimal: before 4.3.23-150400.3.3.4
spacewalk-base: before 4.3.23-150400.3.3.4
spacewalk-backend-xmlrpc: before 4.3.15-150400.3.3.5
spacewalk-backend-xml-export-libs: before 4.3.15-150400.3.3.5
spacewalk-backend-tools: before 4.3.15-150400.3.3.5
spacewalk-backend-sql-postgresql: before 4.3.15-150400.3.3.5
spacewalk-backend-sql: before 4.3.15-150400.3.3.5
spacewalk-backend-server: before 4.3.15-150400.3.3.5
spacewalk-backend-package-push-server: before 4.3.15-150400.3.3.5
spacewalk-backend-iss-export: before 4.3.15-150400.3.3.5
spacewalk-backend-iss: before 4.3.15-150400.3.3.5
spacewalk-backend-config-files-tool: before 4.3.15-150400.3.3.5
spacewalk-backend-config-files-common: before 4.3.15-150400.3.3.5
spacewalk-backend-config-files: before 4.3.15-150400.3.3.5
spacewalk-backend-applet: before 4.3.15-150400.3.3.5
spacewalk-backend-app: before 4.3.15-150400.3.3.5
spacewalk-backend: before 4.3.15-150400.3.3.5
spacecmd: before 4.3.14-150400.3.3.2
salt-netapi-client: before 0.20.0-150400.3.3.5
python3-urlgrabber: before 4.1.0-150400.3.3.1
python3-susemanager-retail: before 1.0.1658330139.861779d-150400.3.3.1
python3-spacewalk-client-tools: before 4.3.11-150400.3.3.4
python3-spacewalk-certs-tools: before 4.3.14-150400.3.3.2
optaplanner: before 7.17.0-150400.3.3.1
mvel2: before 2.2.6.Final-150400.3.3.1
kie-api: before 7.17.0-150400.3.3.1
jose4j: before 0.5.1-150400.3.3.1
jakarta-commons-validator: before 1.1.4-21.150400.21.3.4
image-sync-formula: before 0.1.1658330139.861779d-150400.3.3.1
drools: before 7.17.0-150400.3.3.1
apache-commons-math3: before 3.2-150400.3.3.1
apache-commons-csv: before 1.2-150400.3.3.1
susemanager-tools: before 4.3.18-150400.3.3.2
susemanager: before 4.3.18-150400.3.3.2
smdba: before 1.7.10-0.150400.4.3.1
reprepro-debugsource: before 5.3.0-150400.3.3.1
reprepro-debuginfo: before 5.3.0-150400.3.3.1
reprepro: before 5.3.0-150400.3.3.1
python3-uyuni-common-libs: before 4.3.5-150400.3.3.2
inter-server-sync-debuginfo: before 0.2.3-150400.3.3.1
inter-server-sync: before 0.2.3-150400.3.3.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20223194-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.