Vulnerability Note VU#806908

SUSE WebYaST remotely accessible hosts list vulnerability

Original Release date: 25 Jan 2013 | Last revised: 25 Jan 2013


The WebYaST hosts list is remotely accessible by unauthenticated attackers. An attacker may be able to add a malicious host to the list and perform a man-in-the-middle attack against WebYaST.


The SUSE security advisory states:

    The hosts list used by WebYaST for connecting to it's back end part was modifiable allowing to point to a malicious website which then could access all values sent by WebYaST. The /host configuration path was removed to fix this issue.

Additional details may be found in advisory SUSE-SU-2013:0053-1.


A remote unauthenticated attacker may be able to add a malicious server to the WebYaST hosts file and then be able to perform a man-in-the-middle attack against WebYaST.


Apply an Update

WebYaST patch slewyst12-webyast-base-ui-7236 has been released to address this vulnerability.

Restrict Access

Firewall rules to block untrusted networks and hosts from accessing TCP port 4984 should be implemented.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Novell, Inc.Affected28 Nov 201225 Jan 2013
SUSE LinuxAffected-25 Jan 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N
Temporal 5.0 E:POC/RL:OF/RC:C
Environmental 4.9 CDP:LM/TD:M/CR:M/IR:M/AR:L



Thanks to Tenable Network Security for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2012-0435
  • Date Public: 23 Jan 2013
  • Date First Published: 25 Jan 2013
  • Date Last Updated: 25 Jan 2013
  • Document Revision: 13


If you have feedback, comments, or additional information about this vulnerability, please send us email.