Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0812-1 advisory.
  - Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and     prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core     plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and     allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana     instance. An attacker needs to have the Editor role in order to change a panel to include either an     external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file     containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor     role can change to a known password for a user having Admin role if the user with Admin role executes     malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive     a fix. (CVE-2022-23552)
  - Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8,     malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the     query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with     the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no     longer points to the to the real original dashboard but to the attacker's injected URL. This issue is     fixed in versions 8.5.16 and 9.2.8. (CVE-2022-39324)
  - A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient     to cause a denial of service from a small number of small requests. (CVE-2022-41723)
  - Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if     someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by     poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There     is no workaround, but attacker must have access to the hashed password to use this functionality.
    (CVE-2022-46146)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected dracut-saltboot, spacecmd and / or supportutils-plugin-salt packages.
Plugin Details
File Name: suse_SU-2023-0812-1.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:novell:suse_linux:supportutils-plugin-salt, cpe:/o:novell:suse_linux:15
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: Exploits are available
Patch Publication Date: 3/20/2023
Vulnerability Publication Date: 11/29/2022