CVE-2015-4532
Published Aug 20, 2015
Last updated 8 years ago
Overview
- Description
- EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2514.
- Source
- security_alert@emc.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "414C33C7-CD76-49A4-9BE5-354860F2F635" }, { "criteria": "cpe:2.3:a:emc:documentum_content_server:6.7:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4E00544-98F6-439C-8F4D-822FCAE775CA" }, { "criteria": "cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8335062A-5A8E-4076-B351-7DFA19CEC818" }, { "criteria": "cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B283F797-6DAA-40E1-9FAB-16FCAA5241B4" }, { "criteria": "cpe:2.3:a:emc:documentum_content_server:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87453E34-AC8E-4C79-8486-B4888C621B1C" } ], "operator": "OR" } ] } ]