Design Gap in OpenText Documentum Content Server Allows Elevated Access
CVE-2017-15013
8.8HIGH
Summary
The OpenText Documentum Content Server version 7.3 exhibits a vulnerability that allows authenticated users to exploit a design flaw, effectively obtaining superuser privileges. The server manages uploaded files through dmr_content objects, which can be queried and edited by authenticated users. Although updates have restricted editing capabilities since release 7.2P02, users can still delete existing dmr_content objects and create new entries with the same identifier. This flaw compromises the integrity of sensitive security-related content, allowing unauthorized actions and posing significant risks to data security.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved