Skip to main content

CVE-2022-43754: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in SUSE SUSE Linux Enterprise Module for SUSE Manager Server 4.2

Low
VulnerabilityCVE-2022-43754cvecve-2022-43754cwe-79
Published: Thu Nov 10 2022 (11/10/2022, 07:30:18 UTC)
Source: CVE
Vendor/Project: SUSE
Product: SUSE Linux Enterprise Module for SUSE Manager Server 4.2

Description

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to embed Javascript code via /rhn/audit/scap/Search.do This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10.

AI-Powered Analysis

AILast updated: 06/25/2025, 12:17:29 UTC

Technical Analysis

CVE-2022-43754 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the SUSE Linux Enterprise Module for SUSE Manager Server versions 4.2 and 4.3. This vulnerability arises due to improper neutralization of input during web page generation, specifically in the spacewalk/Uyuni components of the SUSE Manager Server. Remote attackers can exploit this flaw by injecting malicious JavaScript code through the /rhn/audit/scap/Search.do endpoint. The vulnerability affects multiple components and packages within the SUSE Manager Server ecosystem, including hub-xmlrpc-api, inter-server-sync, locale-formula, py27-compat-salt, python-urlgrabber, spacecmd, spacewalk-backend, spacewalk-client-tools, spacewalk-java, spacewalk-utils, spacewalk-web, susemanager, susemanager-doc-indexes, susemanager-docs_en, susemanager-schema, and susemanager-sls, with affected versions prior to specific patch levels as detailed in the advisory. The CVSS 3.1 base score is 2.6, indicating a low severity level, with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N. This means the attack requires network access, high attack complexity, low privileges, and user interaction, and impacts confidentiality slightly without affecting integrity or availability. No known exploits are currently reported in the wild. The vulnerability primarily allows an attacker to execute JavaScript in the context of the victim's browser, potentially leading to session hijacking, phishing, or other client-side attacks if a user visits a crafted URL or interacts with malicious content. However, the requirement for user interaction and low privilege reduces the risk of widespread automated exploitation. The affected SUSE Manager Server is a tool used for managing Linux systems, including patch management, configuration, and monitoring, often deployed in enterprise environments for IT infrastructure management.

Potential Impact

For European organizations, the impact of CVE-2022-43754 is primarily related to the potential compromise of user sessions and the risk of client-side attacks such as phishing or credential theft via malicious scripts executed in the browser. Since SUSE Manager Server is used for managing critical Linux infrastructure, successful exploitation could indirectly affect operational security by undermining trust in management consoles or causing administrators to be targeted with social engineering attacks. However, the vulnerability does not allow direct system compromise, privilege escalation, or denial of service. The low CVSS score and requirement for user interaction limit the severity, but organizations with high reliance on SUSE Manager Server for managing large fleets of Linux servers should consider the risk of targeted attacks, especially in sectors with sensitive data or critical infrastructure. The confidentiality impact is limited but non-negligible, as attackers could steal session tokens or manipulate the user interface to trick administrators. Integrity and availability of the server and managed systems are not directly affected by this vulnerability.

Mitigation Recommendations

1. Apply official patches and updates from SUSE promptly to upgrade all affected components to fixed versions, particularly spacewalk-java (4.2.43 and 4.3.39 or later) and other listed packages. 2. Implement strict Content Security Policy (CSP) headers on the SUSE Manager Server web interface to restrict the execution of unauthorized scripts and reduce the impact of potential XSS payloads. 3. Enforce multi-factor authentication (MFA) for all administrative users to mitigate risks from session hijacking or credential theft. 4. Educate administrators and users on the risks of clicking untrusted links or interacting with suspicious content related to SUSE Manager Server interfaces. 5. Monitor web server logs and application logs for unusual requests to the /rhn/audit/scap/Search.do endpoint or other suspicious activity indicative of attempted exploitation. 6. Restrict network access to the SUSE Manager Server web interface to trusted IP ranges or VPNs to reduce exposure to remote attackers. 7. Conduct regular security assessments and penetration tests focusing on web application security controls of the SUSE Manager Server environment. 8. Use web application firewalls (WAF) with rules tailored to detect and block common XSS attack patterns targeting the affected endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2022-10-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed7ae

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 12:17:29 PM

Last updated: 7/26/2025, 1:33:51 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats