CVE-2018-12470

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in SUSE Linux SMT's RegistrationSharing module allows remote attackers to execute arbitrary SQL commands on the database. It affects SUSE Linux SMT servers running versions prior to 3.0.37, potentially compromising the entire system.

💻 Affected Systems

Products:
  • SUSE Linux SMT (Subscription Management Tool)
Versions: All versions prior to 3.0.37
Operating Systems: SUSE Linux Enterprise Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the RegistrationSharing module enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including data theft, privilege escalation, and potential remote code execution through database functions.

🟠

Likely Case

Database compromise leading to unauthorized access to registration data, potential credential theft, and system manipulation.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only data leakage from specific tables.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication if the SMT server is exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to the SMT server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.37

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1103810

Restart Required: Yes

Instructions:

1. Update SMT using 'zypper update smt' or 'zypper patch'. 2. Verify version is 3.0.37 or higher. 3. Restart SMT services: 'systemctl restart smt'.

🔧 Temporary Workarounds

Disable RegistrationSharing module

linux

Temporarily disable the vulnerable module until patching is possible

systemctl stop smt-registration-sharing
systemctl disable smt-registration-sharing

Network isolation

linux

Restrict network access to SMT server to trusted networks only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application layer
  • Apply network segmentation and firewall rules to restrict access to SMT server

🔍 How to Verify

Check if Vulnerable:

Check SMT version: 'rpm -q smt' and verify if version is below 3.0.37

Check Version:

rpm -q smt

Verify Fix Applied:

Confirm version is 3.0.37 or higher: 'rpm -q smt | grep 3.0.37'

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or registration requests
  • Suspicious patterns in SMT access logs

Network Indicators:

  • Unusual traffic patterns to SMT registration endpoints
  • SQL error messages in HTTP responses

SIEM Query:

source="smt_logs" AND ("sql" OR "injection" OR "registration" AND "error")

🔗 References

📤 Share & Export