{"api_version":"1","generated_at":"2026-05-13T01:29:26+00:00","cve":"CVE-2017-5182","urls":{"html":"https://cve.report/CVE-2017-5182","api":"https://cve.report/api/cve/CVE-2017-5182.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-5182","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-5182"},"summary":{"title":"CVE-2017-5182","description":"Remote Manager in Open Enterprise Server (OES) allows unauthenticated remote attackers to read any arbitrary file, via a specially crafted URL, that allows complete directory traversal and total information disclosure. This vulnerability is present on all versions of OES for linux, it applies to OES2015 SP1 before Maintenance Update 11080, OES2015 before Maintenance Update 11079, OES11 SP3 before Maintenance Update 11078, OES11 SP2 before Maintenance Update 11077).","state":"PUBLIC","assigner":"security@microfocus.com","published_at":"2017-01-23 15:59:00","updated_at":"2023-11-07 02:49:00"},"problem_types":["CWE-22","CWE-200"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/95743","name":"95743","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Novell Open Enterprise Server CVE-2017-5182 Directory Traversal Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1037689","name":"1037689","refsource":"","tags":[],"title":"Novell Open Enterprise Server Bug in Remote Manager Lets Remote Users Traverse the Directory to View Arbitrary Files on the Target System - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.novell.com/support/kb/doc.php?id=7018503","name":"https://www.novell.com/support/kb/doc.php?id=7018503","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"Support | Micro Focus Open Enterprise Server directory traversal vulnerability CVE-2017-5182.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-5182","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5182","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"5182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"novell","cpe5":"open_enterprise_server","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux_kernel","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"novell","cpe5":"open_enterprise_server","cpe6":"2015","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux_kernel","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5182","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"open_enterprise_server","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux_kernel","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5182","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"novell","cpe5":"open_enterprise_server","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux_kernel","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5182","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"novell","cpe5":"open_enterprise_server","cpe6":"2015","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux_kernel","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"5182","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"open_enterprise_server","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"linux_kernel","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@microfocus.com","ID":"CVE-2017-5182","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Open Enterprise Server","version":{"version_data":[{"version_value":"All"}]}}]},"vendor_name":"Micro Focus International"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Remote Manager in Open Enterprise Server (OES) allows unauthenticated remote attackers to read any arbitrary file, via a specially crafted URL, that allows complete directory traversal and total information disclosure. This vulnerability is present on all versions of OES for linux, it applies to OES2015 SP1 before Maintenance Update 11080, OES2015 before Maintenance Update 11079, OES11 SP3 before Maintenance Update 11078, OES11 SP2 before Maintenance Update 11077)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"unauthenticated directory traversal"}]}]},"references":{"reference_data":[{"name":"https://www.novell.com/support/kb/doc.php?id=7018503","refsource":"CONFIRM","url":"https://www.novell.com/support/kb/doc.php?id=7018503"},{"name":"1037689","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1037689"},{"name":"95743","refsource":"BID","url":"http://www.securityfocus.com/bid/95743"}]}},"nvd":{"publishedDate":"2017-01-23 15:59:00","lastModifiedDate":"2023-11-07 02:49:00","problem_types":["CWE-22","CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.8},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:novell:open_enterprise_server:2.0:*:*:*:*:linux_kernel:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:novell:open_enterprise_server:2015:*:*:*:*:linux_kernel:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:open_enterprise_server:11.0:*:*:*:*:linux_kernel:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"5182","Ordinal":"101688","Title":"CVE-2017-5182","CVE":"CVE-2017-5182","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"5182","Ordinal":"1","NoteData":"Remote Manager in Open Enterprise Server (OES) allows unauthenticated remote attackers to read any arbitrary file, via a specially crafted URL, that allows complete directory traversal and total information disclosure. This vulnerability is present on all versions of OES for linux, it applies to OES2015 SP1 before Maintenance Update 11080, OES2015 before Maintenance Update 11079, OES11 SP3 before Maintenance Update 11078, OES11 SP2 before Maintenance Update 11077).","Type":"Description","Title":null},{"CveYear":"2017","CveId":"5182","Ordinal":"2","NoteData":"2017-01-23","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"5182","Ordinal":"3","NoteData":"2021-01-06","Type":"Other","Title":"Modified"}]}}}