First published: Thu Jan 17 2019(Updated: )
It was found that openwsman can access various secret files without having the correct privileges set. A local attacker could use this for information disclosure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openwsman Project Openwsman | <=2.6.9 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3816 is a vulnerability in Openwsman versions up to and including 2.6.9.
CVE-2019-3816 has a severity level of 7.5 (high).
CVE-2019-3816 allows a remote, unauthenticated attacker to exploit the vulnerability by sending a specially crafted HTTP request to the openwsman server.
Openwsman versions up to and including 2.6.9 are affected by CVE-2019-3816.
To fix CVE-2019-3816, users should update to a version of Openwsman that is not vulnerable.