HIGH · 7.2

CVE-2013-3709

WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.

Vulnerability Description

WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.

CVSS Score

7.2

HIGH

AV:L/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
NovellSuse Lifecycle Management Server1.3
SuseStudio Onsite1.3
SuseWebyast1.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-3709?

CVE-2013-3709 is a vulnerability with a CVSS score of 7.2 (HIGH). WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.

How severe is CVE-2013-3709?

CVE-2013-3709 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-3709?

Check the references section above for vendor advisories and patch information. Affected products include: Novell Suse Lifecycle Management Server, Suse Studio Onsite, Suse Webyast.