During a code review of the susehelp package the SuSE Security Team recognized that the security checks done by the susehelp CGI scripts are insufficient. Remote attackers can insert certain characters in CGI queries to the susehelp system tricking it into executing arbitrary code as the “wwwrun” user. Please note that this is only a vulnerability if you have a web server running and configured to allow access to the susehelp system by remote sites. We nevertheless recommend an update of this package. As a temporary workaround you may un-install the susehelp package by issuing the following command as root:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 8.1 | noarch | susehelp-slod | < 2002.09.05-2 | susehelp-SLOD-2002.09.05-2.noarch.rpm |
openSUSE | 8.1 | noarch | susehelp | < 2002.09.05-51 | susehelp-2002.09.05-51.noarch.rpm |