[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BFA4318D-17C2-44E5-A883-B5B52F6BAFC9@panfilov.tel>
Date: Wed, 19 Apr 2017 23:18:49 +1000
From: "Andrey B. Panfilov" <andrew@...filov.tel>
To: "'bugtraq@...urityfocus.com'" <bugtraq@...urityfocus.com>
Subject: CVE-2017-7220. OpenText Documentum Content Server: privilege
evaluation using crafted RPC save-commands.
CVE Identifier: CVE-2017-7220
Vendor: OpenText
Affected products: OpenText Documentum Content Server (all versions)
Researcher: Andrey B. Panfilov
Severity Rating: CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Fix: not available
PoC:
https://gist.github.com/andreybpanfilov/d8792484e13971982c0719ae59ab8c7c
https://gist.github.com/andreybpanfilov/e0e60ae9d525a34cca04eb4c89a21e04
Description:
Initially this vulnerability was discovered in 2013 and was tracked by CERT/CC as VRF#HUFG9EBA (https://www.kb.cert.org/vuls/id/315340), vendor had undertaken a couple of attempts to remediate security flaw (see CVE-2014-2514 and http://seclists.org/bugtraq/2015/Aug/111 for complete description), but all of them was wrong. The issue still persists in all versions of Documentum Content Server.
__
Regards,
Andrey B. Panfilov
View attachment "CVE-2017-7220-01.py" of type "text/x-python-script" (2956 bytes)
View attachment "CVE-2017-7220-02.py" of type "text/x-python-script" (2949 bytes)
Powered by blists - more mailing lists