Description
WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.
References (7)
Core 7
Core References
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00014.html
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00001.html
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00012.html
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00013.html
Various Sources x_refsource_misc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_secret_deserialization.rb
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00006.html
Exploit x_refsource_confirm
https://bugzilla.novell.com/show_bug.cgi?id=851116
Scores
EPSS
0.0003
EPSS Percentile
8.3%
Details
CWE
CWE-264
Status
published
Products (3)
novell/suse_lifecycle_management_server
1.3
suse/studio_onsite
1.3
suse/webyast
1.3
Published
Dec 23, 2013
Tracked Since
Feb 18, 2026