5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.2%
Issue Overview:
Earlier versions of Openwsman are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server. (CVE-2019-3816)
Affected Packages:
openwsman
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update openwsman to update your system.
New Packages:
aarch64:
libwsman1-2.6.3-6.git4391e5c.amzn2.aarch64
libwsman-devel-2.6.3-6.git4391e5c.amzn2.aarch64
openwsman-client-2.6.3-6.git4391e5c.amzn2.aarch64
openwsman-server-2.6.3-6.git4391e5c.amzn2.aarch64
openwsman-python-2.6.3-6.git4391e5c.amzn2.aarch64
openwsman-ruby-2.6.3-6.git4391e5c.amzn2.aarch64
openwsman-perl-2.6.3-6.git4391e5c.amzn2.aarch64
openwsman-debuginfo-2.6.3-6.git4391e5c.amzn2.aarch64
i686:
libwsman1-2.6.3-6.git4391e5c.amzn2.i686
libwsman-devel-2.6.3-6.git4391e5c.amzn2.i686
openwsman-client-2.6.3-6.git4391e5c.amzn2.i686
openwsman-server-2.6.3-6.git4391e5c.amzn2.i686
openwsman-python-2.6.3-6.git4391e5c.amzn2.i686
openwsman-ruby-2.6.3-6.git4391e5c.amzn2.i686
openwsman-perl-2.6.3-6.git4391e5c.amzn2.i686
openwsman-debuginfo-2.6.3-6.git4391e5c.amzn2.i686
src:
openwsman-2.6.3-6.git4391e5c.amzn2.src
x86_64:
libwsman1-2.6.3-6.git4391e5c.amzn2.x86_64
libwsman-devel-2.6.3-6.git4391e5c.amzn2.x86_64
openwsman-client-2.6.3-6.git4391e5c.amzn2.x86_64
openwsman-server-2.6.3-6.git4391e5c.amzn2.x86_64
openwsman-python-2.6.3-6.git4391e5c.amzn2.x86_64
openwsman-ruby-2.6.3-6.git4391e5c.amzn2.x86_64
openwsman-perl-2.6.3-6.git4391e5c.amzn2.x86_64
openwsman-debuginfo-2.6.3-6.git4391e5c.amzn2.x86_64
Red Hat: CVE-2019-3816
Mitre: CVE-2019-3816
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.2%