CVE-2017-7221

OpenText Documentum Content Server has an inadequate protection mechanism against SQL injection, which allows remote authenticated users to execute arbitrary code with super-user privileges by leveraging the availability of the dm_bp_transition docbase method with a user-created dm_procedure object, as demonstrated by use of a backspace character in an injected string. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2513.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Apr/97 Exploit Mailing List Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/98038 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41928/
http://seclists.org/fulldisclosure/2017/Apr/97 Exploit Mailing List Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/98038 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41928/
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentext:documentum_content_server:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:31

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2017/Apr/97 - Exploit, Mailing List, Third Party Advisory, VDB Entry () http://seclists.org/fulldisclosure/2017/Apr/97 - Exploit, Mailing List, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/98038 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98038 - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41928/ - () https://www.exploit-db.com/exploits/41928/ -

Information

Published : 2017-04-25 14:59

Updated : 2024-11-21 03:31


NVD link : CVE-2017-7221

Mitre link : CVE-2017-7221

CVE.ORG link : CVE-2017-7221


JSON object : View

Products Affected

opentext

  • documentum_content_server
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')