Vulnerability identifier: #VU86618
Vulnerability risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Uyuni SUSE Manager
Web applications /
Remote management & hosting panels
Vendor: Uyuni Project
Description
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error in SUSE Manager when processing directory traversal sequences in the private SSH key file name when creating a new user. A remote user can pass a specially crafted filename to the application and overwrite arbitrary files on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Uyuni SUSE Manager: before 4.1
External links
https://bugzilla.suse.com/show_bug.cgi?id=1170848
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.