The WebYaST hosts list is remotely accessible by unauthenticated attackers. An attacker may be able to add a malicious host to the list and perform a man-in-the-middle attack against WebYaST.
The SUSE security advisory states:
The hosts list used by WebYaST for connecting to it's back end part was modifiable allowing to point to a malicious website which then could access all values sent by WebYaST. The /host configuration path was removed to fix this issue.
A remote unauthenticated attacker may be able to add a malicious server to the WebYaST hosts file and then be able to perform a man-in-the-middle attack against WebYaST.
Apply an Update
Thanks to Tenable Network Security for reporting this vulnerability.
|Date First Published:||2013-01-25|
|Date Last Updated:||2013-01-25 21:28 UTC|