Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2019-03-14T00:00:00
Updated: 2022-10-07T00:00:00
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3816
JSON object: View
NVD Information
Status : Modified
Published: 2019-03-14T22:29:01.243
Modified: 2023-02-12T23:38:20.437
Link: CVE-2019-3816
JSON object: View
Redhat Information
No data.
CWE