Vulnerability Description
Directory traversal vulnerability in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish Engine, and Enterprise Edition Compuset Engine, allows remote authenticated users to read arbitrary files by leveraging xDashboard access.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emc | Document Sciences Xpression | 4.1 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2013-11/0095.html
- http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-
- http://www.kb.cert.org/vuls/id/346982US Government Resource
- http://www.securitytracker.com/id/1029384
- http://archives.neohapsis.com/archives/bugtraq/2013-11/0095.html
- http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-
- http://www.kb.cert.org/vuls/id/346982US Government Resource
- http://www.securitytracker.com/id/1029384
FAQ
What is CVE-2013-6177?
CVE-2013-6177 is a vulnerability with a CVSS score of 3.5 (LOW). Directory traversal vulnerability in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish En...
How severe is CVE-2013-6177?
CVE-2013-6177 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6177?
Check the references section above for vendor advisories and patch information. Affected products include: Emc Document Sciences Xpression.