First published: Tue Feb 07 2023(Updated: )
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in libzypp-plugin-appdata of SUSE Linux Enterprise Server for SAP 15-SP3; openSUSE Leap 15.4 allows attackers that can trick users to use specially crafted REPO_ALIAS, REPO_TYPE or REPO_METADATA_PATH settings to execute code as root. This issue affects: SUSE Linux Enterprise Server for SAP 15-SP3 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426. openSUSE Leap 15.4 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Libzypp-plugin-appdata | <1.0.1\+git.20180426 | |
openSUSE Leap | =15.4 | |
Suse Suse Linux Enterprise Server | =15-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-22643.
The title of the vulnerability is 'An Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in libzypp-plugin-appdata of SUSE Linux Enterprise Server for SAP 15-SP3; openSUSE Leap 15.4'.
The severity of CVE-2023-22643 is high with a severity value of 7.8.
The software affected by CVE-2023-22643 is Opensuse Libzypp-plugin-appdata, openSUSE Leap 15.4, and SUSE Linux Enterprise Server for SAP 15-SP3.
The OS Command Injection vulnerability in libzypp-plugin-appdata can be exploited by tricking users to use specially crafted REPO_ALIAS, REPO_TYPE or REPO_METADATA.