Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-2183 CVE-2023-2801 CVE-2023-3128 |
CWE-ID | CWE-862 CWE-662 CWE-287 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
openSUSE Leap Operating systems & Components / Operating system release-notes-susemanager Operating systems & Components / Operating system package or component release-notes-susemanager-proxy Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU78470
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-2183
CWE-ID:
CWE-862 - Missing Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to missing authorization in the alerts feature within API. A remote user can use the API to send multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.
MitigationUpdate the affected package Maintenance update for SUSE Manager 4.3.7 Release Notes to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.4
release-notes-susemanager: before 4.3.7-150400.3.72.1
release-notes-susemanager-proxy: before 4.3.7-150400.3.58.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20233136-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77623
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-2801
CWE-ID:
CWE-662 - Improper Synchronization
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect synchronization when processing multiple requests. A remote user can query multiple distinct data sources using mixed queries via public dashboard or API and crash Grafana instances.
MitigationUpdate the affected package Maintenance update for SUSE Manager 4.3.7 Release Notes to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.4
release-notes-susemanager: before 4.3.7-150400.3.72.1
release-notes-susemanager-proxy: before 4.3.7-150400.3.58.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20233136-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77652
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-3128
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in Azure AD OAuth implementation. Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. A remote attacker can modify their profile and provide the email address of an existing Grafana user, bypass authentication process and gain unauthorized access to the application.
The vulnerability affects Grafana installations with Azure AD OAuth configured for a multi-tenant app.
Update the affected package Maintenance update for SUSE Manager 4.3.7 Release Notes to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.4
release-notes-susemanager: before 4.3.7-150400.3.72.1
release-notes-susemanager-proxy: before 4.3.7-150400.3.58.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20233136-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.