OpenText Documentum Content Server has an inadequate protection mechanism against SQL injection, which allows remote authenticated users to execute arbitrary code with super-user privileges by leveraging the availability of the dm_bp_transition docbase method with a user-created dm_procedure object, as demonstrated by use of a backspace character in an injected string. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2513.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Apr/97 | Exploit Mailing List Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/98038 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41928/ | |
http://seclists.org/fulldisclosure/2017/Apr/97 | Exploit Mailing List Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/98038 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41928/ |
Configurations
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Apr/97 - Exploit, Mailing List, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/98038 - Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/41928/ - |
Information
Published : 2017-04-25 14:59
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7221
Mitre link : CVE-2017-7221
CVE.ORG link : CVE-2017-7221
JSON object : View
Products Affected
opentext
- documentum_content_server
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')