EMC Documentum D2 Input Validation Flaw Lets Remote Authenticated Users Obtain Potentially Sensitive Information
|
SecurityTracker Alert ID: 1032769 |
SecurityTracker URL: http://securitytracker.com/id/1032769
|
CVE Reference:
CVE-2015-0547, CVE-2015-0548
(Links to External Site)
|
Date: Jul 1 2015
|
Impact:
Disclosure of system information, Disclosure of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): D2 4.1, 4.2, 4.5
|
Description:
A vulnerability was reported in EMC Documentum D2. A remote authenticated user can obtain potentially sensitive information on the target system.
A remote authetnicated user can send specially crafted data to inject data query language (DQL) commands and obtain potentially sensitive information from the database on the target system.
The D2CenterstageService.getComments method is affected [CVE-2015-0547].
Ionut Popescu, Security Consultant at KPMG Romania, reported this vulnerability.
The D2DownloadService.getDownloadUrls method is affected [CVE-2015-0548].
Ionut Ambrosie reported this vulnerability.
|
Impact:
A remote authenticated user can obtain potentially sensitive information from the target database.
|
Solution:
The vendor has issued a fix (D2 4.2 P16, D2 4.5 P03).
|
Vendor URL: www.emc.com/ (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Windows (2000), Windows (2003)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|