An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The action xmlexport accepts the parameter requestContext. If this parameter is present, the response includes most of the HTTP headers sent to the server and some of the CGI variables like remote_adde and server_name, which is an information disclosure.
References
Link | Resource |
---|---|
https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2023/Jan/14 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2023-01-18 13:15
Updated : 2023-01-26 11:11
NVD link : CVE-2022-45925
Mitre link : CVE-2022-45925
JSON object : View
CWE
Products Affected
opentext
- opentext_extended_ecm