libzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls
CVE-2023-22643
7.8HIGH
Key Information:
- Vendor
- SUSE
- Vendor
- CVE Published:
- 7 February 2023
Summary
An improper handling of special elements in the libzypp-plugin-appdata of SUSE Linux Enterprise Server and openSUSE Leap permits malicious actors to exploit the system. By manipulating REPO_ALIAS, REPO_TYPE, or REPO_METADATA_PATH settings, attackers can execute arbitrary code with root privileges, potentially compromising the integrity and security of affected systems. This vulnerability affects specific versions of the libzypp-plugin-appdata, highlighting the need for users to update to the latest versions to mitigate these risks.
Affected Version(s)
openSUSE Leap 15.4 libzypp-plugin-appdata < 1.0.1+git.20180426
SUSE Linux Enterprise Server for SAP 15-SP3 libzypp-plugin-appdata < 1.0.1+git.20180426
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Matthias Gerstner of SUSE