First published: Fri Oct 13 2017(Updated: )
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). When unpacking TAR archives, Content Server fails to verify the contents of an archive, which causes a path traversal vulnerability via symlinks. Because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Documentum Content Server | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15276 is classified as a critical vulnerability due to its potential for privilege escalation.
To fix CVE-2017-15276, users should upgrade OpenText Documentum Content Server to a version above 7.3.
CVE-2017-15276 allows an authenticated user to gain superuser privileges through the exploitation of design flaws in TAR archive handling.
CVE-2017-15276 affects all versions of OpenText Documentum Content Server up to and including 7.3.
Exploitation of CVE-2017-15276 requires authenticated access, so it cannot be directly exploited remotely.