{
  "threat_severity" : "Important",
  "public_date" : "2019-03-12T00:00:00Z",
  "bugzilla" : {
    "description" : "openwsman: Disclosure of arbitrary files outside of the registered URIs",
    "id" : "1667070",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1667070"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.", "Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server." ],
  "statement" : "Red Hat OpenStack Platform currently only utilizes the client and python client API bindings, not the server components of openwsman. Additionally, updates for this package are received through the Red Hat Enterprise Linux repository.\nRed Hat Enterprise Virtualization uses only the openwsman-python client API bindings, not the server components of openwsman.\nThis issue affects the versions of openwsman as shipped with Red Hat Enterprise Linux 6 and 7.\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
  "acknowledgement" : "Red Hat would like to thank NEC Corporation for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2019-03-26T00:00:00Z",
    "advisory" : "RHSA-2019:0638",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "openwsman-0:2.6.3-6.git4391e5c.el7_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-05-07T00:00:00Z",
    "advisory" : "RHSA-2019:0972",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "openwsman-0:2.6.5-5.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "openwsman",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 8 (Liberty) Director",
    "fix_state" : "Will not fix",
    "package_name" : "openwsman",
    "cpe" : "cpe:/a:redhat:openstack-director:8"
  }, {
    "product_name" : "Red Hat OpenStack Platform 9 (Mitaka) Director",
    "fix_state" : "Will not fix",
    "package_name" : "openwsman",
    "cpe" : "cpe:/a:redhat:openstack-director:9"
  }, {
    "product_name" : "Red Hat Virtualization 4",
    "fix_state" : "Not affected",
    "package_name" : "redhat-virtualization-host",
    "cpe" : "cpe:/o:redhat:rhev_hypervisor:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-3816\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-3816" ],
  "name" : "CVE-2019-3816",
  "csaw" : false
}