First published: Sat Dec 06 2014(Updated: )
EMC Documentum Content Server 7.0, 7.1 before 7.1 P10, and 6.7 before SP2 P19 allows remote authenticated users to read or delete arbitrary files via unspecified vectors related to an insecure direct object reference.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | =6.7 | |
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4629 is rated as a high severity vulnerability due to the potential for unauthorized access and manipulation of files.
To fix CVE-2014-4629, update to EMC Documentum Content Server versions 6.7 SP2 P19 or 7.1 P10 or later.
CVE-2014-4629 affects users of EMC Documentum Content Server versions 6.7, 7.0, and 7.1 before the specified patches.
CVE-2014-4629 can be exploited through file reading or deletion attacks by authenticated remote users.
The implications of CVE-2014-4629 include potential data loss and unauthorized access to sensitive information.