First published: Wed Mar 09 2022(Updated: )
A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE Open Build Service | <2021-10-08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36777 is a Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service.
CVE-2021-36777 allows attackers to present users with an expected login form that then sends the clear text credentials to an attacker-specified server.
CVE-2021-36777 has a severity rating of 8.8, which is considered high.
To mitigate CVE-2021-36777, it is recommended to update openSUSE Build service to a version released after October 8, 2021.
More information about CVE-2021-36777 can be found at the following link: https://bugzilla.suse.com/show_bug.cgi?id=1191209