// For flags

CVE-2016-5765

Attachmate Host Access Management and Security Server PassThru Information Disclosure Vulnerability

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Administrative Server in Micro Focus Host Access Management and Security Server (MSS) and Reflection for the Web (RWeb) and Reflection Security Gateway (RSG) and Reflection ZFE (ZFE) allows remote unauthenticated attackers to read arbitrary files via a specially crafted URL that allows limited directory traversal. Applies to MSS 12.3 before 12.3.326 and MSS 12.2 before 12.2.342 and RSG 12.1 before 12.1.362 and RWeb 12.3 before 12.3.312 and RWeb 12.2 before 12.2.342 and RWeb 12.1 before 12.1.362 and ZFE 2.0.1 before 2.0.1.18 and ZFE 2.0.0 before 2.0.0.52 and ZFE 1.4.0 before 1.4.0.14.

Administrative Server en Micro Focus Host Access Management y Security Server (MSS) y Reflection para la Web (RWeb) y Reflection Security Gateway (RSG) y Reflection ZFE (ZFE) permite a atacantes remotos no autenticados leer archivos arbitrarios a través de una URL especialmente manipulada que permite recorrido de directorio limitado. Se aplica a MSS 12.3 en versiones anteriores a 12.3.326 y MSS 12.2 en versiones anteriores a 12.2.342 y RSG 12.1 en versiones anteriores a 12.1.362 y RWeb 12.3 en versiones anteriores a 12.3.312 y RWeb 12.2 en versiones anteriores a 12.2.342 y RWeb 12.1 en versiones anteriores a 12.1.362 y ZFE 2.0.1 en versiones anteriores a 2.0.1.18 y ZFE 2.0.0 en versiones anteriores a 2.0.0.52 y ZFE 1.4.0 en versiones anteriores a 1.4.0.14.

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Attachmate Host Access Management and Security Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the PassThru resource. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information under the context of the current process.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-06-23 CVE Reserved
  • 2016-11-29 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-09-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microfocus
Search vendor "Microfocus"
Host Access Management And Security Server
Search vendor "Microfocus" for product "Host Access Management And Security Server"
12.2
Search vendor "Microfocus" for product "Host Access Management And Security Server" and version "12.2"
-
Affected
Microfocus
Search vendor "Microfocus"
Host Access Management And Security Server
Search vendor "Microfocus" for product "Host Access Management And Security Server"
12.3
Search vendor "Microfocus" for product "Host Access Management And Security Server" and version "12.3"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection For The Web
Search vendor "Microfocus" for product "Reflection For The Web"
12.1
Search vendor "Microfocus" for product "Reflection For The Web" and version "12.1"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection For The Web
Search vendor "Microfocus" for product "Reflection For The Web"
12.2
Search vendor "Microfocus" for product "Reflection For The Web" and version "12.2"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection For The Web
Search vendor "Microfocus" for product "Reflection For The Web"
12.3
Search vendor "Microfocus" for product "Reflection For The Web" and version "12.3"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection Security Gateway
Search vendor "Microfocus" for product "Reflection Security Gateway"
12.1
Search vendor "Microfocus" for product "Reflection Security Gateway" and version "12.1"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection Zfe
Search vendor "Microfocus" for product "Reflection Zfe"
1.4.0.14
Search vendor "Microfocus" for product "Reflection Zfe" and version "1.4.0.14"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection Zfe
Search vendor "Microfocus" for product "Reflection Zfe"
2.0.0.52
Search vendor "Microfocus" for product "Reflection Zfe" and version "2.0.0.52"
-
Affected
Microfocus
Search vendor "Microfocus"
Reflection Zfe
Search vendor "Microfocus" for product "Reflection Zfe"
2.0.1.18
Search vendor "Microfocus" for product "Reflection Zfe" and version "2.0.1.18"
-
Affected