Описание
OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:opentext:documentum_d2:4.0:*:*:*:*:*:*:*
cpe:2.3:a:opentext:documentum_d2:4.1:*:*:*:*:*:*:*
cpe:2.3:a:opentext:documentum_d2:4.2:*:*:*:*:*:*:*
cpe:2.3:a:opentext:documentum_d2:4.3:*:*:*:*:*:*:*
cpe:2.3:a:opentext:documentum_d2:4.4:*:*:*:*:*:*:*
cpe:2.3:a:opentext:documentum_d2:4.5:*:*:*:*:*:*:*
cpe:2.3:a:opentext:documentum_d2:4.6:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.35327
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.
EPSS
Процентиль: 97%
0.35327
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-20