First published: Wed Sep 27 2017(Updated: )
Multiple open redirect vulnerabilities in OpenText Documentum Administrator 7.2.0180.0055 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a (1) URL in the startat parameter to xda/help/en/default.htm or (2) /%09/ (slash encoded horizontal tab slash) followed by a domain in the redirectUrl parameter to xda/component/virtuallinkconnect.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Documentum Administrator | =7.2.0180.0055 | |
OpenText Documentum Webtop | =6.8.0160.0073 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14524 has a medium severity rating due to its potential for phishing attacks via open redirect vulnerabilities.
To mitigate CVE-2017-14524, upgrade OpenText Documentum Administrator to version 7.2.0180.0056 or later.
CVE-2017-14524 can enable remote attackers to conduct phishing attacks by redirecting users to arbitrary websites.
CVE-2017-14524 affects OpenText Documentum Administrator version 7.2.0180.0055 and Documentum Webtop version 6.8.0160.0073.
CVE-2017-14524 is not classified as critical but poses significant risks related to user security and trust due to its open redirect capability.