First published: Thu Nov 21 2013(Updated: )
Directory traversal vulnerability in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish Engine, and Enterprise Edition Compuset Engine, allows remote authenticated users to read arbitrary files by leveraging xDashboard access.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Document Sciences xPression | =4.1-sp1 | |
EMC Document Sciences xPression | =4.2 | |
EMC Document Sciences xPression | =4.5 | |
EMC Document Sciences xPression | =4.1-sp1 | |
EMC Document Sciences xPression | =4.2 | |
EMC Document Sciences xPression | =4.5 | |
EMC Document Sciences xPression | =4.1-sp1 | |
EMC Document Sciences xPression | =4.2 | |
EMC Document Sciences xPression | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6177 is classified as a medium severity vulnerability due to its ability to allow remote authenticated users to read arbitrary files.
To fix CVE-2013-6177, you should apply the appropriate patches for EMC Document Sciences xPression, specifically Patch 47 for 4.1 SP1, Patch 26 for 4.2, and Patch 05 for 4.5.
CVE-2013-6177 affects EMC Document Sciences xPression versions 4.1 SP1, 4.2, and 4.5 prior to their respective patches.
CVE-2013-6177 can be exploited by remote authenticated users granted access to the vulnerable EMC Document Sciences xPression application.
CVE-2013-6177 enables a directory traversal attack that allows unauthorized file access on the server.