CVE-2022-45927

An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Java application server can be used to bypass the authentication of the QDS endpoints of the Content Server. These endpoints can be used to create objects and execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentext:opentext_extended_ecm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:29

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en OpenText Content Suite Platform 22.1 (16.2.19.1803). El servidor de aplicaciones Java se puede utilizar para omitir la autenticación de los endpoints QDS del servidor de contenidos. Estos endpoints se pueden utilizar para crear objetos y ejecutar código arbitrario.
References () http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2023/Jan/13 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/13 - Exploit, Mailing List, Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ - Exploit, Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ - Exploit, Third Party Advisory

Information

Published : 2023-01-18 22:15

Updated : 2024-11-21 07:29


NVD link : CVE-2022-45927

Mitre link : CVE-2022-45927

CVE.ORG link : CVE-2022-45927


JSON object : View

Products Affected

opentext

  • opentext_extended_ecm
CWE
CWE-639

Authorization Bypass Through User-Controlled Key