CVE-2013-6177
Published Nov 21, 2013
Last updated 9 years ago
Overview
- Description
- Directory traversal vulnerability in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish Engine, and Enterprise Edition Compuset Engine, allows remote authenticated users to read arbitrary files by leveraging xDashboard access.
- Source
- security_alert@emc.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.1:sp1:-:*:enterprise:-:-:compuset_engine", "vulnerable": true, "matchCriteriaId": "430FC38B-D983-43D4-AAF3-2D4039D0BE31" }, { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:enterprise:-:-:compuset_engine", "vulnerable": true, "matchCriteriaId": "B9A60542-B868-4F1A-9026-A694A53A223F" }, { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.5:-:-:*:enterprise:-:-:compuset_engine", "vulnerable": true, "matchCriteriaId": "EF09806D-23FE-4ECF-8689-E94D3D28E8C2" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.1:sp1:-:*:enterprise:-:-:publish_engine", "vulnerable": true, "matchCriteriaId": "17E73BF4-ADFC-4B20-9614-30E67E75F16F" }, { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:enterprise:-:-:publish_engine", "vulnerable": true, "matchCriteriaId": "2BCCDFAE-3909-4FE3-92CB-F07ADC815F54" }, { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.5:-:-:*:enterprise:-:-:publish_engine", "vulnerable": true, "matchCriteriaId": "C900B51A-4065-4B1F-A107-99FD391B9A4A" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.1:sp1:-:*:documentum:*:*:*", "vulnerable": true, "matchCriteriaId": "77E14258-E508-4508-A8D9-1DD1FAF1E409" }, { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:documentum:*:*:*", "vulnerable": true, "matchCriteriaId": "1DE2E916-23D6-4D20-AAFB-FA26EF9B371D" }, { "criteria": "cpe:2.3:a:emc:document_sciences_xpression:4.5:-:-:*:documentum:*:*:*", "vulnerable": true, "matchCriteriaId": "41C367DF-1FE4-4E56-8A01-E63DFFE44068" } ], "operator": "OR" } ] } ]