First published: Thu Aug 20 2015(Updated: )
EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization after creation of an object, which allows remote authenticated users to execute arbitrary code with super-user privileges via a custom script. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2513.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 | |
EMC Documentum Content Server | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4533 has a high severity rating due to its ability to allow remote authenticated users to execute arbitrary code with super-user privileges.
To fix CVE-2015-4533, upgrade to a patched version of EMC Documentum Content Server, specifically versions 6.7SP1 P32, 6.7SP2 P25, 7.0 P19, 7.1 P16, or 7.2 P02 or later.
The affected versions include EMC Documentum Content Server 6.7SP1 before P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02.
Yes, CVE-2015-4533 can be exploited remotely by authenticated users with access to execute custom scripts.
CVE-2015-4533 is an authorization bypass vulnerability that allows unauthorized execution of code.