First published: Wed Sep 27 2017(Updated: )
Multiple open redirect vulnerabilities in OpenText Documentum Webtop 6.8.0160.0073 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a (1) URL in the startat parameter to xda/help/en/default.htm or (2) /%09/ (slash encoded horizontal tab slash) followed by a domain in the redirectUrl parameter to xda/component/virtuallinkconnect.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Documentum Administrator | =7.2.0180.0055 | |
OpenText Documentum Webtop | =6.8.0160.0073 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14525 is categorized as a medium severity vulnerability.
To fix CVE-2017-14525, update the OpenText Documentum Webtop to the latest version that addresses this vulnerability.
CVE-2017-14525 affects users of OpenText Documentum Webtop version 6.8.0160.0073 and OpenText Documentum Administrator version 7.2.0180.0055.
CVE-2017-14525 is classified as an open redirect vulnerability, allowing attackers to redirect users to arbitrary websites.
Attackers can leverage CVE-2017-14525 to conduct phishing attacks by redirecting users to malicious sites.