Vulnerabilities > CVE-2012-0435 - Unspecified vulnerability in Suse Webyast 1.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN suse
nessus
Summary
SUSE WebYaST before 1.2 0.2.63-0.6.1 allows remote attackers to modify the hosts list, and subsequently conduct man-in-the-middle attacks, via a crafted /host request on TCP port 4984.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | WEBYAST_MITM.NASL |
description | The WebYaST web client hosted on the remote web server is vulnerable to a man-in-the-middle attack. Authentication is not required to modify which hosts the WebYaST web client is configured to connect to. A remote, unauthenticated attacker could exploit this by causing all WebYaST traffic to be routed through a host under their control. This could result in the disclosure of sensitive information (e.g., usernames and passwords) and could allow an attacker to modify requests in transit. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 64244 |
published | 2013-01-25 |
reporter | This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/64244 |
title | WebYaST Host Modification MiTM |
code |
|
References
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00008.html
- http://support.novell.com/security/cve/CVE-2012-0435.html
- http://www.kb.cert.org/vuls/id/806908
- https://bugzilla.novell.com/show_bug.cgi?id=792712
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00008.html
- https://bugzilla.novell.com/show_bug.cgi?id=792712
- http://www.kb.cert.org/vuls/id/806908
- http://support.novell.com/security/cve/CVE-2012-0435.html