cnvd-2015-04322
Vulnerability from cnvd

Title: EMC多款产品任意文件上传漏洞

Description:

EMC Documentum是一款企业文档和图像管理工具,使文档的创建、修改、跟踪和在业务过程中的利用变得高效、规范和严谨

EMC多款产品存在任意文件上传漏洞,攻击者利用这些漏洞可向后端内容服务器上传任意类型的文件。

Severity:

Patch Name: EMC多款产品任意文件上传漏洞的补丁

Patch Description:

EMC Documentum是一款企业文档和图像管理工具,使文档的创建、修改、跟踪和在业务过程中的利用变得高效、规范和严谨。EMC多款产品存在任意文件上传漏洞,攻击者利用这些漏洞可向后端内容服务器上传任意类型的文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://emc.subscribenet.com/control/dctm/download?element=3887191

Reference: http://www.securityfocus.com/archive/1/535897

Impacted products
Name
['EMC Documentum Webtop 6.7SP1(<P310', 'EMC Documentum Webtop 6.7SP2(<P23)', 'EMC Documentum Webtop 6.8(<P01)', 'EMC Documentum Administrator 6.7SP1(<P31)', 'EMC Documentum Administrator 6.7SP2(<P23)', 'EMC Documentum Administrator 7.0(<P18)', 'EMC Documentum Administrator 7.1(<P15)', 'EMC Documentum Administrator 7.2(<P01)', 'EMC Documentum Digital Assets Manager 6.5SP6(<P25)', 'EMC Documentum Web Publishers 6.5 SP7(<P25)', 'EMC Documentum Task Space 6.7SP1(<P31)', 'EMC Documentum Task Space 6.7SP2(<P23)']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-4524"
    }
  },
  "description": "EMC Documentum\u662f\u4e00\u6b3e\u4f01\u4e1a\u6587\u6863\u548c\u56fe\u50cf\u7ba1\u7406\u5de5\u5177\uff0c\u4f7f\u6587\u6863\u7684\u521b\u5efa\u3001\u4fee\u6539\u3001\u8ddf\u8e2a\u548c\u5728\u4e1a\u52a1\u8fc7\u7a0b\u4e2d\u7684\u5229\u7528\u53d8\u5f97\u9ad8\u6548\u3001\u89c4\u8303\u548c\u4e25\u8c28\r\n\r\nEMC\u591a\u6b3e\u4ea7\u54c1\u5b58\u5728\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u53ef\u5411\u540e\u7aef\u5185\u5bb9\u670d\u52a1\u5668\u4e0a\u4f20\u4efb\u610f\u7c7b\u578b\u7684\u6587\u4ef6\u3002",
  "discovererName": "EMC",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://emc.subscribenet.com/control/dctm/download?element=3887191",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-04322",
  "openTime": "2015-07-08",
  "patchDescription": "EMC Documentum\u662f\u4e00\u6b3e\u4f01\u4e1a\u6587\u6863\u548c\u56fe\u50cf\u7ba1\u7406\u5de5\u5177\uff0c\u4f7f\u6587\u6863\u7684\u521b\u5efa\u3001\u4fee\u6539\u3001\u8ddf\u8e2a\u548c\u5728\u4e1a\u52a1\u8fc7\u7a0b\u4e2d\u7684\u5229\u7528\u53d8\u5f97\u9ad8\u6548\u3001\u89c4\u8303\u548c\u4e25\u8c28\u3002EMC\u591a\u6b3e\u4ea7\u54c1\u5b58\u5728\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u53ef\u5411\u540e\u7aef\u5185\u5bb9\u670d\u52a1\u5668\u4e0a\u4f20\u4efb\u610f\u7c7b\u578b\u7684\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "EMC\u591a\u6b3e\u4ea7\u54c1\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "EMC Documentum Webtop 6.7SP1(\u003cP310",
      "EMC Documentum Webtop 6.7SP2(\u003cP23)",
      "EMC Documentum Webtop 6.8(\u003cP01)",
      "EMC Documentum Administrator 6.7SP1(\u003cP31)",
      "EMC Documentum Administrator 6.7SP2(\u003cP23)",
      "EMC Documentum Administrator 7.0(\u003cP18)",
      "EMC Documentum Administrator 7.1(\u003cP15)",
      "EMC Documentum Administrator 7.2(\u003cP01)",
      "EMC Documentum Digital Assets Manager 6.5SP6(\u003cP25)",
      "EMC Documentum Web Publishers 6.5 SP7(\u003cP25)",
      "EMC Documentum Task Space 6.7SP1(\u003cP31)",
      "EMC Documentum Task Space 6.7SP2(\u003cP23)"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/archive/1/535897",
  "serverity": "\u9ad8",
  "submitTime": "2015-07-03",
  "title": "EMC\u591a\u6b3e\u4ea7\u54c1\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…