First published: Fri Aug 23 2019(Updated: )
Path traversal vulnerability in Micro Focus Verastream Host Integrator (VHI), versions 7.7 SP2 and earlier, The vulnerability allows remote unauthenticated attackers to read arbitrary files.
Credit: security@microfocus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Verastream Host Integrator | =7.5 | |
Microfocus Verastream Host Integrator | =7.5-sp1 | |
Microfocus Verastream Host Integrator | =7.6 | |
Microfocus Verastream Host Integrator | =7.6-sp1 | |
Microfocus Verastream Host Integrator | =7.7 | |
Microfocus Verastream Host Integrator | =7.7-sp1 | |
Microfocus Verastream Host Integrator | =7.7-sp1_update_1 | |
Microfocus Verastream Host Integrator | =7.7-sp1_update_2 | |
Microfocus Verastream Host Integrator | =7.7-sp2 |
An update, VHI 7.7 SP2 Update 1, that fixes this vulnerability is available to maintained customers through the download website, https://download.attachmate.com/upgrades. Micro Focus recommends that customers upgrade as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11654 is a path traversal vulnerability in Micro Focus Verastream Host Integrator (VHI), versions 7.7 SP2 and earlier.
CVE-2019-11654 allows remote unauthenticated attackers to read arbitrary files.
CVE-2019-11654 has a severity rating of 7.5 (high).
To fix CVE-2019-11654, it is recommended to update Micro Focus Verastream Host Integrator to version 7.7 SP3 or later.
You can find more information about CVE-2019-11654 in the Micro Focus support knowledge base at https://support.microfocus.com/kb/doc.php?id=7024061.