CVE-2022-21949

NameCVE-2022-21949
DescriptionA Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1010667

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-xmlhash (PTS)buster, bullseye1.3.6-2vulnerable
sid, trixie, bookworm1.3.6-3.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-xmlhashsource(unstable)1.3.6-3.11010667

Notes

[bullseye] - ruby-xmlhash <no-dsa> (Minor issue)
[buster] - ruby-xmlhash <no-dsa> (Minor issue)
https://bugzilla.suse.com/show_bug.cgi?id=1197928
https://github.com/coolo/xmlhash/commit/544e614e2674ad26b97a234baa013723c829b751 (1.3.8)

Search for package or bug name: Reporting problems