First published: Wed Feb 22 2017(Updated: )
OpenText Documentum Content Server (formerly EMC Documentum Content Server) 7.3, when PostgreSQL Database is used and return_top_results_row_based config option is false, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and execute arbitrary DML or DDL commands via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2520.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | =7.3 | |
=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5585 has been assigned a CVSS score that indicates a high severity level due to its potential for DQL injection attacks.
To mitigate CVE-2017-5585, users should update to a newer version of OpenText Documentum Content Server or apply available patches.
DQL injection in CVE-2017-5585 refers to the ability of an attacker to manipulate DQL queries in order to execute unauthorized commands.
CVE-2017-5585 specifically affects users of OpenText Documentum Content Server version 7.3 when using PostgreSQL as the database.
Yes, CVE-2017-5585 can be exploited remotely by authenticated users, making it a significant vulnerability for organizations.