CVE-2016-5765
Attachmate Host Access Management and Security Server PassThru Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Administrative Server in Micro Focus Host Access Management and Security Server (MSS) and Reflection for the Web (RWeb) and Reflection Security Gateway (RSG) and Reflection ZFE (ZFE) allows remote unauthenticated attackers to read arbitrary files via a specially crafted URL that allows limited directory traversal. Applies to MSS 12.3 before 12.3.326 and MSS 12.2 before 12.2.342 and RSG 12.1 before 12.1.362 and RWeb 12.3 before 12.3.312 and RWeb 12.2 before 12.2.342 and RWeb 12.1 before 12.1.362 and ZFE 2.0.1 before 2.0.1.18 and ZFE 2.0.0 before 2.0.0.52 and ZFE 1.4.0 before 1.4.0.14.
Administrative Server en Micro Focus Host Access Management y Security Server (MSS) y Reflection para la Web (RWeb) y Reflection Security Gateway (RSG) y Reflection ZFE (ZFE) permite a atacantes remotos no autenticados leer archivos arbitrarios a través de una URL especialmente manipulada que permite recorrido de directorio limitado. Se aplica a MSS 12.3 en versiones anteriores a 12.3.326 y MSS 12.2 en versiones anteriores a 12.2.342 y RSG 12.1 en versiones anteriores a 12.1.362 y RWeb 12.3 en versiones anteriores a 12.3.312 y RWeb 12.2 en versiones anteriores a 12.2.342 y RWeb 12.1 en versiones anteriores a 12.1.362 y ZFE 2.0.1 en versiones anteriores a 2.0.1.18 y ZFE 2.0.0 en versiones anteriores a 2.0.0.52 y ZFE 1.4.0 en versiones anteriores a 1.4.0.14.
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Attachmate Host Access Management and Security Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the PassThru resource. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information under the context of the current process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-23 CVE Reserved
- 2016-11-29 CVE Published
- 2024-08-06 CVE Updated
- 2024-09-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://support.attachmate.com/techdocs/1704.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/94579 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-16-618 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microfocus Search vendor "Microfocus" | Host Access Management And Security Server Search vendor "Microfocus" for product "Host Access Management And Security Server" | 12.2 Search vendor "Microfocus" for product "Host Access Management And Security Server" and version "12.2" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Host Access Management And Security Server Search vendor "Microfocus" for product "Host Access Management And Security Server" | 12.3 Search vendor "Microfocus" for product "Host Access Management And Security Server" and version "12.3" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection For The Web Search vendor "Microfocus" for product "Reflection For The Web" | 12.1 Search vendor "Microfocus" for product "Reflection For The Web" and version "12.1" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection For The Web Search vendor "Microfocus" for product "Reflection For The Web" | 12.2 Search vendor "Microfocus" for product "Reflection For The Web" and version "12.2" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection For The Web Search vendor "Microfocus" for product "Reflection For The Web" | 12.3 Search vendor "Microfocus" for product "Reflection For The Web" and version "12.3" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection Security Gateway Search vendor "Microfocus" for product "Reflection Security Gateway" | 12.1 Search vendor "Microfocus" for product "Reflection Security Gateway" and version "12.1" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection Zfe Search vendor "Microfocus" for product "Reflection Zfe" | 1.4.0.14 Search vendor "Microfocus" for product "Reflection Zfe" and version "1.4.0.14" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection Zfe Search vendor "Microfocus" for product "Reflection Zfe" | 2.0.0.52 Search vendor "Microfocus" for product "Reflection Zfe" and version "2.0.0.52" | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Reflection Zfe Search vendor "Microfocus" for product "Reflection Zfe" | 2.0.1.18 Search vendor "Microfocus" for product "Reflection Zfe" and version "2.0.1.18" | - |
Affected
|