Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
2019-03-14T22:29:01.243
2024-11-21T04:42:36.087
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | openwsman_project | openwsman | ≤ 2.6.9 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux_desktop | 7.0 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.1 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.4 | Yes |
Operating System | redhat | enterprise_linux_server | 7.0 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 7.6 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.4 | Yes |
Operating System | redhat | enterprise_linux_server_eus | 7.6 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 7.6 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.4 | Yes |
Operating System | redhat | enterprise_linux_workstation | 7.0 | Yes |
Operating System | fedoraproject | fedora | 28 | Yes |
Operating System | fedoraproject | fedora | 29 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | opensuse | leap | 15.0 | Yes |
Operating System | opensuse | leap | 42.3 | Yes |