libzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls
CVE-2023-22643

7.8HIGH

Key Information:

Vendor
SUSE
Vendor
CVE Published:
7 February 2023

Summary

An improper handling of special elements in the libzypp-plugin-appdata of SUSE Linux Enterprise Server and openSUSE Leap permits malicious actors to exploit the system. By manipulating REPO_ALIAS, REPO_TYPE, or REPO_METADATA_PATH settings, attackers can execute arbitrary code with root privileges, potentially compromising the integrity and security of affected systems. This vulnerability affects specific versions of the libzypp-plugin-appdata, highlighting the need for users to update to the latest versions to mitigate these risks.

Affected Version(s)

openSUSE Leap 15.4 libzypp-plugin-appdata < 1.0.1+git.20180426

SUSE Linux Enterprise Server for SAP 15-SP3 libzypp-plugin-appdata < 1.0.1+git.20180426

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Matthias Gerstner of SUSE
.