First published: Fri Oct 13 2017(Updated: )
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 does not properly validate the input of the PUT_FILE RPC-command, which allows any authenticated user to hijack an arbitrary file from the Content Server filesystem; because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Documentum Content Server | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15012 is rated as a high-severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2017-15012, ensure that you update OpenText Documentum Content Server to a version newer than 7.3 that addresses this vulnerability.
CVE-2017-15012 can be exploited to hijack arbitrary files from the Content Server filesystem, which may lead to unauthorized data access.
CVE-2017-15012 affects all users of OpenText Documentum Content Server versions up to and including 7.3.
The main cause of CVE-2017-15012 is the lack of proper input validation in the PUT_FILE RPC-command.