CWE
200 22
Advisory Published
Updated

CVE-2016-5765: Infoleak

First published: Tue Nov 29 2016(Updated: )

Administrative Server in Micro Focus Host Access Management and Security Server (MSS) and Reflection for the Web (RWeb) and Reflection Security Gateway (RSG) and Reflection ZFE (ZFE) allows remote unauthenticated attackers to read arbitrary files via a specially crafted URL that allows limited directory traversal. Applies to MSS 12.3 before 12.3.326 and MSS 12.2 before 12.2.342 and RSG 12.1 before 12.1.362 and RWeb 12.3 before 12.3.312 and RWeb 12.2 before 12.2.342 and RWeb 12.1 before 12.1.362 and ZFE 2.0.1 before 2.0.1.18 and ZFE 2.0.0 before 2.0.0.52 and ZFE 1.4.0 before 1.4.0.14.

Credit: meissner@suse.de

Affected SoftwareAffected VersionHow to fix
Microfocus Host Access Management And Security Server=12.2
Microfocus Host Access Management And Security Server=12.3
Microfocus Reflection For The Web=12.1
Microfocus Reflection For The Web=12.2
Microfocus Reflection For The Web=12.3
Microfocus Reflection Security Gateway=12.1
Microfocus Reflection ZFE=1.4.0.14
Microfocus Reflection ZFE=2.0.0.52
Microfocus Reflection ZFE=2.0.1.18

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-5765?

    CVE-2016-5765 is classified as a vulnerability that allows remote unauthenticated attackers to read arbitrary files, indicating a high severity risk.

  • How do I fix CVE-2016-5765?

    To mitigate CVE-2016-5765, you should update to the latest versions of affected software: Micro Focus Host Access Management and Security Server, Reflection for the Web, Reflection Security Gateway, and Reflection ZFE.

  • What products are impacted by CVE-2016-5765?

    CVE-2016-5765 affects Micro Focus Host Access Management and Security Server versions 12.2 and 12.3, Reflection for the Web versions 12.1, 12.2, and 12.3, Reflection Security Gateway version 12.1, and Reflection ZFE versions 1.4.0.14, 2.0.0.52, and 2.0.1.18.

  • Can CVE-2016-5765 be exploited remotely?

    Yes, CVE-2016-5765 can be exploited by remote unauthenticated attackers.

  • What type of attack is CVE-2016-5765 associated with?

    CVE-2016-5765 is associated with a file read vulnerability that allows attackers to access sensitive file information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203