SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   EMC Documentum Vendors:   EMC
EMC Documentum D2 Input Validation Flaw Lets Remote Authenticated Users Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1032769
SecurityTracker URL:  http://securitytracker.com/id/1032769
CVE Reference:   CVE-2015-0547, CVE-2015-0548   (Links to External Site)
Date:  Jul 1 2015
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): D2 4.1, 4.2, 4.5
Description:   A vulnerability was reported in EMC Documentum D2. A remote authenticated user can obtain potentially sensitive information on the target system.

A remote authetnicated user can send specially crafted data to inject data query language (DQL) commands and obtain potentially sensitive information from the database on the target system.

The D2CenterstageService.getComments method is affected [CVE-2015-0547].

Ionut Popescu, Security Consultant at KPMG Romania, reported this vulnerability.

The D2DownloadService.getDownloadUrls method is affected [CVE-2015-0548].

Ionut Ambrosie reported this vulnerability.

Impact:   A remote authenticated user can obtain potentially sensitive information from the target database.
Solution:   The vendor has issued a fix (D2 4.2 P16, D2 4.5 P03).
Vendor URL:  www.emc.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC