Vulnerability Note VU#806908
SUSE WebYaST remotely accessible hosts list vulnerability
The WebYaST hosts list is remotely accessible by unauthenticated attackers. An attacker may be able to add a malicious host to the list and perform a man-in-the-middle attack against WebYaST.
The SUSE security advisory states:
The hosts list used by WebYaST for connecting to it's back end part was modifiable allowing to point to a malicious website which then could access all values sent by WebYaST. The /host configuration path was removed to fix this issue.
Additional details may be found in advisory SUSE-SU-2013:0053-1.
A remote unauthenticated attacker may be able to add a malicious server to the WebYaST hosts file and then be able to perform a man-in-the-middle attack against WebYaST.
Apply an Update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Novell, Inc.||Affected||28 Nov 2012||25 Jan 2013|
|SUSE Linux||Affected||-||25 Jan 2013|
CVSS Metrics (Learn More)
Thanks to Tenable Network Security for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: CVE-2012-0435
- Date Public: 23 Jan 2013
- Date First Published: 25 Jan 2013
- Date Last Updated: 25 Jan 2013
- Document Revision: 13
If you have feedback, comments, or additional information about this vulnerability, please send us email.