{"api_version":"1","generated_at":"2026-04-22T19:59:41+00:00","cve":"CVE-2023-32182","urls":{"html":"https://cve.report/CVE-2023-32182","api":"https://cve.report/api/cve/CVE-2023-32182.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-32182","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-32182"},"summary":{"title":"CVE-2023-32182","description":"A Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux Enterprise Desktop 15 SP5 postfix, SUSE SUSE Linux Enterprise High Performance Computing 15 SP5 postfix, SUSE openSUSE Leap 15.5 postfix.This issue affects SUSE Linux Enterprise Desktop 15 SP5: before 3.7.3-150500.3.5.1; SUSE Linux Enterprise High Performance Computing 15 SP5: before 3.7.3-150500.3.5.1; openSUSE Leap 15.5 : before 3.7.3-150500.3.5.1.","state":"PUBLIC","assigner":"security@suse.com","published_at":"2023-09-19 16:15:00","updated_at":"2023-09-25 16:32:00"},"problem_types":["CWE-59"],"metrics":[],"references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32182","name":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32182","refsource":"MISC","tags":[],"title":"1211196 – (CVE-2023-32182) VUL-0: CVE-2023-32182: postfix: config_postfix SUSE specific script potentially bad /tmp file usage","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-32182","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32182","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"32182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp5","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux_enterprise_desktop","cpe6":"15","cpe7":"sp5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-32182","qid":"754904","title":"SUSE Enterprise Linux Security Update for postfix (SUSE-SU-2023:3732-1)"},{"cve":"CVE-2023-32182","qid":"754928","title":"SUSE Enterprise Linux Security Update for postfix (SUSE-SU-2023:3791-1)"},{"cve":"CVE-2023-32182","qid":"755023","title":"SUSE Enterprise Linux Security Update for postfix (SUSE-SU-2023:3945-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-32182","ASSIGNER":"security@suse.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux Enterprise Desktop 15 SP5 postfix, SUSE SUSE Linux Enterprise High Performance Computing 15 SP5 postfix, SUSE openSUSE Leap 15.5 postfix.This issue affects SUSE Linux Enterprise Desktop 15 SP5: before 3.7.3-150500.3.5.1; SUSE Linux Enterprise High Performance Computing 15 SP5: before 3.7.3-150500.3.5.1; openSUSE Leap 15.5 : before 3.7.3-150500.3.5.1.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-59: Improper Link Resolution Before File Access ('Link Following')","cweId":"CWE-59"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"SUSE","product":{"product_data":[{"product_name":"SUSE Linux Enterprise Desktop 15 SP5","version":{"version_data":[{"version_affected":"<","version_name":"?","version_value":"3.7.3-150500.3.5.1"}]}},{"product_name":"SUSE Linux Enterprise High Performance Computing 15 SP5","version":{"version_data":[{"version_affected":"<","version_name":"?","version_value":"3.7.3-150500.3.5.1"}]}},{"product_name":"openSUSE Leap 15.5 ","version":{"version_data":[{"version_affected":"<","version_name":"?","version_value":"3.7.3-150500.3.5.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32182","refsource":"MISC","name":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32182"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","value":"Matthias Gerstner of SUSE"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-19 16:15:00","lastModifiedDate":"2023-09-25 16:32:00","problem_types":["CWE-59"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:suse_linux_enterprise_desktop:15:sp5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:-:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}