Vulnerability Description
OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 configure excessive permissions by default on Windows. During installation, a displaylistcache file share is created on the Windows server with full read and write permissions for the Everyone group at both the NTFS and Share levels. The share is used to retrieve documents for processing, and to store processed documents for display in the browser. The only required share level access is read/write by the JobProcessor service account. At the local filesystem level, the only additional required permissions would be read/write from the servlet engine, such as Tomcat. (The affected server components are not installed with Content Server by default, and must be installed separately.) NOTE: the vendor's position is that customers are not supposed to use this default setting without consulting the documentation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opentext | Brava\! | >= 7.5, <= 16.4 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/150125/Brava-Enterprise-Server-16.4-InformMitigationThird Party AdvisoryVDB Entry
- https://packetstormsecurity.com/files/150125/Brava-Enterprise-Server-16.4-InformMitigationThird Party AdvisoryVDB Entry
FAQ
What is CVE-2019-12270?
CVE-2019-12270 is a vulnerability with a CVSS score of 7.4 (HIGH). OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 configure excessive permissions by default on Windows. During installation, a displaylistcache file share is created on the Windows server...
How severe is CVE-2019-12270?
CVE-2019-12270 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-12270?
Check the references section above for vendor advisories and patch information. Affected products include: Opentext Brava\!, Microsoft Windows.