OpenText Documentum Content Server allows superuser access via sys_obj_save or save of a crafted object, followed by an unauthorized "UPDATE dm_dbo.dm_user_s SET user_privileges=16" command, aka an "RPC save-commands" attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4532.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://seclists.org/bugtraq/2017/Apr/61 | mailing list exploit third party advisory |
https://gist.github.com/andreybpanfilov/e0e60ae9d525a34cca04eb4c89a21e04 | third party advisory exploit |
https://gist.github.com/andreybpanfilov/d8792484e13971982c0719ae59ab8c7c | third party advisory exploit |