Vulnerability Description
Multiple XML external entity (XXE) vulnerabilities in the OpenText Documentum Webtop 6.8.0160.0073 allow remote authenticated users to list the contents of arbitrary directories, read arbitrary files, cause a denial of service, or, on Windows, obtain Documentum user hashes via a (1) crafted DTD, involving unspecified XML structures in a request to xda/com/documentum/ucf/server/transport/impl/GAIRConnector or crafted XML file in a MediaProfile file (2) import or (3) check in.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opentext | Documentum Administrator | 7.2.0180.0055 |
| Opentext | Documentum Webtop | 6.8.0160.0073 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Sep/58ExploitMailing ListThird Party Advisory
- https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774Permissions Required
- http://seclists.org/fulldisclosure/2017/Sep/58ExploitMailing ListThird Party Advisory
- https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774Permissions Required
FAQ
What is CVE-2017-14527?
CVE-2017-14527 is a vulnerability with a CVSS score of 8.8 (HIGH). Multiple XML external entity (XXE) vulnerabilities in the OpenText Documentum Webtop 6.8.0160.0073 allow remote authenticated users to list the contents of arbitrary directories, read arbitrary files,...
How severe is CVE-2017-14527?
CVE-2017-14527 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14527?
Check the references section above for vendor advisories and patch information. Affected products include: Opentext Documentum Administrator, Opentext Documentum Webtop.