{"id":"UBUNTU-CVE-2019-3816","details":"Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.","modified":"2026-01-20T17:11:18.450657Z","published":"2019-03-14T22:29:00Z","upstream":["CVE-2019-3816"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-3816"},{"type":"REPORT","url":"http://bugzilla.suse.com/show_bug.cgi?id=1122623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-3816"}],"affected":[{"package":{"name":"openwsman","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.4.7-0ubuntu2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.7-0ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.4.7-0ubuntu2","binary_name":"libopenwsman-dev"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libopenwsman1"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libwsman-client2"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libwsman-clientpp-dev"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libwsman-clientpp1"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libwsman-curl-client-transport1"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libwsman-server1"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"libwsman1"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"openwsman"},{"binary_version":"2.4.7-0ubuntu2","binary_name":"python-openwsman"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3816.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.7-0ubuntu2","2.6.5-0ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.5-0ubuntu3","binary_name":"libopenwsman-dev"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libopenwsman1"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libwsman-client4"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libwsman-clientpp-dev"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libwsman-clientpp1"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libwsman-curl-client-transport1"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libwsman-server1"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"libwsman1"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"openwsman"},{"binary_version":"2.6.5-0ubuntu3","binary_name":"python-openwsman"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3816.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu3","2.6.5-0ubuntu5"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.5-0ubuntu5","binary_name":"libopenwsman-dev"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libopenwsman1"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libwsman-client4"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libwsman-clientpp-dev"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libwsman-clientpp1"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libwsman-curl-client-transport1"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libwsman-server1"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"libwsman1"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"openwsman"},{"binary_version":"2.6.5-0ubuntu5","binary_name":"python-openwsman"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3816.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu5","2.6.5-0ubuntu6"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.5-0ubuntu6","binary_name":"libopenwsman-dev"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libopenwsman1"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libwsman-client4"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libwsman-clientpp-dev"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libwsman-clientpp1"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libwsman-curl-client-transport1"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libwsman-server1"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"libwsman1"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"openwsman"},{"binary_version":"2.6.5-0ubuntu6","binary_name":"python-openwsman"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3816.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu15?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu8","2.6.5-0ubuntu10","2.6.5-0ubuntu11","2.6.5-0ubuntu12","2.6.5-0ubuntu15"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.5-0ubuntu15","binary_name":"libopenwsman-dev"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libopenwsman1"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libwsman-client4t64"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libwsman-clientpp-dev"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libwsman-clientpp1t64"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libwsman-curl-client-transport1"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libwsman-server1t64"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"libwsman1t64"},{"binary_version":"2.6.5-0ubuntu15","binary_name":"openwsman"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3816.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu16?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu15","2.6.5-0ubuntu16"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.5-0ubuntu16","binary_name":"libopenwsman-dev"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libopenwsman1"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libwsman-client4t64"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libwsman-clientpp-dev"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libwsman-clientpp1t64"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libwsman-curl-client-transport1"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libwsman-server1t64"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"libwsman1t64"},{"binary_version":"2.6.5-0ubuntu16","binary_name":"openwsman"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3816.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}