libzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls
CVE-2023-22643
7.8HIGH
Key Information
- Vendor
- SUSE
- Status
- SUSE Linux Enterprise Server for SAP 15-SP3
- openSUSE Leap 15.4
- Vendor
- CVE Published:
- 7 February 2023
Summary
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in libzypp-plugin-appdata of SUSE Linux Enterprise Server for SAP 15-SP3; openSUSE Leap 15.4 allows attackers that can trick users to use specially crafted REPO_ALIAS, REPO_TYPE or REPO_METADATA_PATH settings to execute code as root. This issue affects: SUSE Linux Enterprise Server for SAP 15-SP3 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426. openSUSE Leap 15.4 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426.
Affected Version(s)
SUSE Linux Enterprise Server for SAP 15-SP3 < 1.0.1+git.20180426
openSUSE Leap 15.4 < 1.0.1+git.20180426
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Matthias Gerstner of SUSE