An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Java application server can be used to bypass the authentication of the QDS endpoints of the Content Server. These endpoints can be used to create objects and execute arbitrary code.
References
Link | Resource |
---|---|
https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2023/Jan/13 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2023-01-18 14:15
Updated : 2023-01-30 07:28
NVD link : CVE-2022-45927
Mitre link : CVE-2022-45927
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
opentext
- opentext_extended_ecm