CVE-2022-45928

A remote OScript execution issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). Multiple endpoints allow the user to pass the parameter htmlFile, which is included in the HTML output rendering pipeline of a request. Because the Content Server evaluates and executes Oscript code in HTML files, it is possible for an attacker to execute Oscript code. The Oscript scripting language allows the attacker (for example) to manipulate files on the filesystem, create new network connections, or execute OS commands.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentext:opentext_extended_ecm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:29

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema de ejecución remota de OScript en OpenText Content Suite Platform 22.1 (16.2.19.1803). Varios endpoints permiten al usuario pasar el parámetro htmlFile, que se incluye en el proceso de representación de salida HTML de una solicitud. Debido a que Content Server evalúa y ejecuta código Oscript en archivos HTML, es posible que un atacante ejecute código Oscript. El lenguaje de programación Oscript permite al atacante (por ejemplo) manipular archivos en el sistema de archivos, crear nuevas conexiones de red o ejecutar comandos del sistema operativo.
References () http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2023/Jan/14 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/14 - Exploit, Mailing List, Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ - Exploit, Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ - Exploit, Third Party Advisory

Information

Published : 2023-01-18 21:15

Updated : 2024-11-21 07:29


NVD link : CVE-2022-45928

Mitre link : CVE-2022-45928

CVE.ORG link : CVE-2022-45928


JSON object : View

Products Affected

opentext

  • opentext_extended_ecm