CVE-2023-6152 Affecting golang-github-prometheus-promu package, versions <0.14.0-150000.3.18.2


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating

    Threat Intelligence

    EPSS
    0.04% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-SLES155-GOLANGGITHUBPROMETHEUSPROMU-6810251
  • published 7 May 2024
  • disclosed 6 May 2024

How to fix?

Upgrade SLES:15.5 golang-github-prometheus-promu to version 0.14.0-150000.3.18.2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-prometheus-promu package and not the golang-github-prometheus-promu package as distributed by SLES. See How to fix? for SLES:15.5 relevant fixed versions and status.

A user changing their email after signing up and verifying it can change it without verification in profile settings.

The configuration option "verify_email_enabled" will only validate email only on sign up.

References

CVSS Scores

version 3.1
Expand this section

SUSE

5.4 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    Low
  • Availability (A)
    Low
Expand this section

Red Hat

5.4 medium