{"containers":{"cna":{"affected":[{"product":"CaaS Platform 3.0","vendor":"SUSE","versions":[{"lessThan":"16.21.2-27.68.1","status":"affected","version":"libzypp","versionType":"custom"}]},{"product":"SUSE Linux Enterprise Server 12","vendor":"SUSE","versions":[{"lessThan":"16.21.2-2.45.1","status":"affected","version":"libzypp","versionType":"custom"}]},{"product":"SUSE Linux Enterprise Server 15","vendor":"SUSE","versions":[{"status":"affected","version":"libzypp 17.19.0-3.34.1"}]}],"credits":[{"lang":"en","value":"Matthias Gerstner of SUSE"}],"datePublic":"2020-01-24T00:00:00.000Z","descriptions":[{"lang":"en","value":": Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-276","description":"CWE-276: Incorrect Default Permissions","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-03-04T04:05:59.000Z","orgId":"404e59f5-483d-4b8a-8e7a-e67604dd8afb","shortName":"suse"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1158763"},{"name":"openSUSE-SU-2020:0255","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html"},{"name":"[debian-lts-announce] 20200304 [SECURITY] [DLA 2132-1] libzypp security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html"}],"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1158763","defect":["1158763"],"discovery":"INTERNAL"},"title":"libzypp stores cookies world readable","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@suse.com","DATE_PUBLIC":"2020-01-24T00:00:00.000Z","ID":"CVE-2019-18900","STATE":"PUBLIC","TITLE":"libzypp stores cookies world readable"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CaaS Platform 3.0","version":{"version_data":[{"version_affected":"<","version_name":"libzypp","version_value":"16.21.2-27.68.1"}]}},{"product_name":"SUSE Linux Enterprise Server 12","version":{"version_data":[{"version_affected":"<","version_name":"libzypp","version_value":"16.21.2-2.45.1"}]}},{"product_name":"SUSE Linux Enterprise Server 15","version":{"version_data":[{"version_name":"libzypp","version_value":"17.19.0-3.34.1"}]}}]},"vendor_name":"SUSE"}]}},"credit":[{"lang":"eng","value":"Matthias Gerstner of SUSE"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":": Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-276: Incorrect Default Permissions"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1158763","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1158763"},{"name":"openSUSE-SU-2020:0255","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html"},{"name":"[debian-lts-announce] 20200304 [SECURITY] [DLA 2132-1] libzypp security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html"}]},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1158763","defect":["1158763"],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T02:02:39.846Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1158763"},{"name":"openSUSE-SU-2020:0255","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html"},{"name":"[debian-lts-announce] 20200304 [SECURITY] [DLA 2132-1] libzypp security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html"}]}]},"cveMetadata":{"assignerOrgId":"404e59f5-483d-4b8a-8e7a-e67604dd8afb","assignerShortName":"suse","cveId":"CVE-2019-18900","datePublished":"2020-01-24T15:15:15.806Z","dateReserved":"2019-11-12T00:00:00.000Z","dateUpdated":"2024-09-16T20:52:26.745Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}