#VU86618 Path traversal in Uyuni SUSE Manager - CVE-2023-32189


Vulnerability identifier: #VU86618

Vulnerability risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-32189

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Uyuni SUSE Manager
Web applications / Remote management & hosting panels

Vendor: Uyuni Project

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error in SUSE Manager when processing directory traversal sequences in the private SSH key file name when creating a new user. A remote user can pass a specially crafted filename to the application and overwrite arbitrary files on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Uyuni SUSE Manager: before 4.1


External links
https://bugzilla.suse.com/show_bug.cgi?id=1170848


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability