Upstream information

CVE-2018-18838 at MITRE

Description

An issue was discovered in Netdata 1.10.0. Log Injection (or Log Forgery) exists via a %0a sequence in the url parameter to api/v1/registry.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact None
CVSSv3 Version 3
SUSE Bugzilla entry: 1139098 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP2
  • netdata >= 1.29.3-bp152.4.3.1
Patchnames:
openSUSE-2021-730
SUSE Package Hub 15 SP3
  • netdata >= 1.31.0-bp153.2.3.1
Patchnames:
openSUSE-2021-1603
openSUSE Leap 15.2
  • netdata >= 1.29.3-lp152.4.3.1
Patchnames:
openSUSE-2021-647
openSUSE Leap 15.3
  • netdata >= 1.31.0-bp153.2.3.1
Patchnames:
openSUSE-2021-1603
openSUSE Tumbleweed
  • netdata >= 1.31.0-1.3
Patchnames:
openSUSE-Tumbleweed-2024-11083


SUSE Timeline for this CVE

CVE page created: Mon Jun 24 11:59:51 2019
CVE page last modified: Tue Sep 3 19:10:49 2024