Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r467-q4j9-32j6

Опубликовано: 18 мая 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root.

OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root.

EPSS

Процентиль: 0%
0.00007
Низкий

7.8 High

CVSS3

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 7.8
nvd
больше 2 лет назад

OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root.

EPSS

Процентиль: 0%
0.00007
Низкий

7.8 High

CVSS3

Дефекты

CWE-732