First published: Tue May 21 2019(Updated: )
OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 configure excessive permissions by default on Windows. During installation, a displaylistcache file share is created on the Windows server with full read and write permissions for the Everyone group at both the NTFS and Share levels. The share is used to retrieve documents for processing, and to store processed documents for display in the browser. The only required share level access is read/write by the JobProcessor service account. At the local filesystem level, the only additional required permissions would be read/write from the servlet engine, such as Tomcat. (The affected server components are not installed with Content Server by default, and must be installed separately.) NOTE: the vendor's position is that customers are not supposed to use this default setting without consulting the documentation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opentext Brava\! | >=7.5<=16.4 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12270 has been classified with a severity that indicates a significant security risk due to excessive permissions granted by default.
To fix CVE-2019-12270, restrict the permissions on the displaylistcache file share to only allow access for authorized users.
CVE-2019-12270 affects OpenText Brava! Enterprise and Brava! Server versions from 7.5 to 16.4.
CVE-2019-12270 misconfigures permissions by allowing full read and write access to the Everyone group.
No, Microsoft Windows is not vulnerable in CVE-2019-12270; the vulnerability is specific to OpenText Brava! software.