Vulnerability CVE-2019-3816


Published: 2019-03-14

Description:
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.

Type:

CWE-200

(Information Exposure)

Vendor: Openwsman project
Product: Openwsman 
Version: 2.6.9;

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
http://bugzilla.suse.com/show_bug.cgi?id=1122623
http://www.securityfocus.com/bid/107368
http://www.securityfocus.com/bid/107409
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816

Copyright 2019, cxsecurity.com

 

Back to Top