OpenText Documentum Content Server (formerly EMC Documentum Content Server) 7.3, when PostgreSQL Database is used and return_top_results_row_based config option is false, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and execute arbitrary DML or DDL commands via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2520.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/96224 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/96224 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/96224 - Third Party Advisory, VDB Entry |
Information
Published : 2017-02-22 16:59
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5585
Mitre link : CVE-2017-5585
CVE.ORG link : CVE-2017-5585
JSON object : View
Products Affected
opentext
- documentum_content_server
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')