lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BFA4318D-17C2-44E5-A883-B5B52F6BAFC9@panfilov.tel>
Date: Wed, 19 Apr 2017 23:18:49 +1000
From: "Andrey B. Panfilov" <andrew@...filov.tel>
To: "'bugtraq@...urityfocus.com'" <bugtraq@...urityfocus.com>
Subject: CVE-2017-7220. OpenText Documentum Content Server: privilege
 evaluation using crafted RPC save-commands.

CVE Identifier: CVE-2017-7220
Vendor: OpenText
Affected products: OpenText  Documentum Content Server (all versions)
Researcher: Andrey B. Panfilov
Severity Rating: CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Fix: not available
PoC: 

https://gist.github.com/andreybpanfilov/d8792484e13971982c0719ae59ab8c7c 
https://gist.github.com/andreybpanfilov/e0e60ae9d525a34cca04eb4c89a21e04


Description:

Initially this vulnerability was discovered in 2013 and was tracked by CERT/CC as VRF#HUFG9EBA (https://www.kb.cert.org/vuls/id/315340), vendor had undertaken a couple of attempts to remediate security flaw (see CVE-2014-2514 and http://seclists.org/bugtraq/2015/Aug/111 for complete description), but all of them was wrong. The issue still persists in all versions of Documentum Content Server.

__
Regards,
Andrey B. Panfilov



View attachment "CVE-2017-7220-01.py" of type "text/x-python-script" (2956 bytes)

View attachment "CVE-2017-7220-02.py" of type "text/x-python-script" (2949 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ