Vulnerability CVE-2019-3816


Published: 2019-03-14

Description:
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.

Type:

CWE-200

(Information Exposure)

Vendor: Redhat
Product: Enterprise linux server tus 
Version: 7.6;
Product: Enterprise linux server eus 
Version: 7.6;
Product: Enterprise linux server aus 
Version: 7.6;
Product: Enterprise linux server 
Version: 7.0;
Product: Enterprise linux workstation 
Version: 7.0;
Product: Enterprise linux desktop 
Version: 7.0;
Vendor: Opensuse
Product: LEAP 
Version: 42.3; 15.0;
Vendor: Fedoraproject
Product: Fedora 
Version:
30
29
28
Vendor: Openwsman project
Product: Openwsman 
Version: 2.6.9;

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
http://bugzilla.suse.com/show_bug.cgi?id=1122623
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00065.html
http://www.securityfocus.com/bid/107368
http://www.securityfocus.com/bid/107409
https://access.redhat.com/errata/RHSA-2019:0638
https://access.redhat.com/errata/RHSA-2019:0972
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2V5HJ355RSKMFQ7GRJAHRZNDVXASF7TA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2HEZ7D7GF3HDF36JLGYXIK5URR66DS4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXQP7UDPRZIZ4LM7FEJCTC2EDUYVOR2J/

Copyright 2019, cxsecurity.com

 

Back to Top