7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.4 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.2%
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
[
{
"vendor": "[UNKNOWN]",
"product": "openwsman",
"versions": [
{
"version": "versions up to and including 2.6.9",
"status": "affected"
}
]
}
]
bugzilla.suse.com/show_bug.cgi?id=1122623
lists.opensuse.org/opensuse-security-announce/2019-04/msg00006.html
lists.opensuse.org/opensuse-security-announce/2019-04/msg00065.html
www.securityfocus.com/bid/107368
www.securityfocus.com/bid/107409
access.redhat.com/errata/RHSA-2019:0638
access.redhat.com/errata/RHSA-2019:0972
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2V5HJ355RSKMFQ7GRJAHRZNDVXASF7TA/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B2HEZ7D7GF3HDF36JLGYXIK5URR66DS4/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXQP7UDPRZIZ4LM7FEJCTC2EDUYVOR2J/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.4 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.2%