Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26777 | An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in libzypp-plugin-appdata of SUSE Linux Enterprise Server for SAP 15-SP3; openSUSE Leap 15.4 allows attackers that can trick users to use specially crafted REPO_ALIAS, REPO_TYPE or REPO_METADATA_PATH settings to execute code as root. This issue affects: SUSE Linux Enterprise Server for SAP 15-SP3 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426. openSUSE Leap 15.4 libzypp-plugin-appdata versions prior to 1.0.1+git.20180426. |
| Link | Providers |
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=1206836 |
|
Tue, 25 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2025-03-25T14:31:19.350Z
Reserved: 2023-01-05T00:00:00.000Z
Link: CVE-2023-22643
Updated: 2024-08-02T10:13:49.511Z
Status : Modified
Published: 2023-02-07T10:15:52.687
Modified: 2024-11-21T07:45:07.000
Link: CVE-2023-22643
No data.
OpenCVE Enrichment
No data.
EUVD