Opentext Documentum Content Server File Hijack / Privilege Escalation
Posted by deepcore on October 15, 2017 – 2:33 pm
Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of the PUT_FILE RPC command which allows any authenticated user to hijack arbitrary file from the Content Server filesystem. Because some files on the Content Server filesystem are security-sensitive this security flaw leads to privilege escalation.
Post a reply
You must be logged in to post a comment.