cnvd-2015-04325
Vulnerability from cnvd
Title: EMC多款产品跨站脚本漏洞
Description:
EMC Documentum是一款企业文档和图像管理工具,使文档的创建、修改、跟踪和在业务过程中的利用变得高效、规范和严谨。
EMC多款产品存在跨站脚本漏洞,攻击者利用这些漏洞可注入任意HTML代码或脚本。
Severity: 中
Patch Name: EMC多款产品跨站脚本漏洞的补丁
Patch Description:
EMC Documentum是一款企业文档和图像管理工具,使文档的创建、修改、跟踪和在业务过程中的利用变得高效、规范和严谨。EMC多款产品存在跨站脚本漏洞,攻击者利用这些漏洞可注入任意HTML代码或脚本。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://emc.subscribenet.com/control/dctm/download?element=3887191
Reference: http://www.securityfocus.com/archive/1/535897
Impacted products
Name | ['EMC Documentum Webtop 6.7SP1(<P310', 'EMC Documentum Webtop 6.7SP2(<P23)', 'EMC Documentum Webtop 6.8(<P01)', 'EMC Documentum Administrator 6.7SP1(<P31)', 'EMC Documentum Administrator 6.7SP2(<P23)', 'EMC Documentum Administrator 7.0(<P18)', 'EMC Documentum Administrator 7.1(<P15)', 'EMC Documentum Administrator 7.2(<P01)', 'EMC Documentum Digital Assets Manager 6.5SP6(<P25)', 'EMC Documentum Web Publishers 6.5 SP7(<P25)', 'EMC Documentum Task Space 6.7SP1(<P31)', 'EMC Documentum Task Space 6.7SP2(<P23)'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-0551" } }, "description": "EMC Documentum\u662f\u4e00\u6b3e\u4f01\u4e1a\u6587\u6863\u548c\u56fe\u50cf\u7ba1\u7406\u5de5\u5177\uff0c\u4f7f\u6587\u6863\u7684\u521b\u5efa\u3001\u4fee\u6539\u3001\u8ddf\u8e2a\u548c\u5728\u4e1a\u52a1\u8fc7\u7a0b\u4e2d\u7684\u5229\u7528\u53d8\u5f97\u9ad8\u6548\u3001\u89c4\u8303\u548c\u4e25\u8c28\u3002\r\n\r\nEMC\u591a\u6b3e\u4ea7\u54c1\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u53ef\u6ce8\u5165\u4efb\u610fHTML\u4ee3\u7801\u6216\u811a\u672c\u3002", "discovererName": "EMC", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://emc.subscribenet.com/control/dctm/download?element=3887191", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-04325", "openTime": "2015-07-08", "patchDescription": "EMC Documentum\u662f\u4e00\u6b3e\u4f01\u4e1a\u6587\u6863\u548c\u56fe\u50cf\u7ba1\u7406\u5de5\u5177\uff0c\u4f7f\u6587\u6863\u7684\u521b\u5efa\u3001\u4fee\u6539\u3001\u8ddf\u8e2a\u548c\u5728\u4e1a\u52a1\u8fc7\u7a0b\u4e2d\u7684\u5229\u7528\u53d8\u5f97\u9ad8\u6548\u3001\u89c4\u8303\u548c\u4e25\u8c28\u3002EMC\u591a\u6b3e\u4ea7\u54c1\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u53ef\u6ce8\u5165\u4efb\u610fHTML\u4ee3\u7801\u6216\u811a\u672c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "EMC\u591a\u6b3e\u4ea7\u54c1\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "EMC Documentum Webtop 6.7SP1(\u003cP310", "EMC Documentum Webtop 6.7SP2(\u003cP23)", "EMC Documentum Webtop 6.8(\u003cP01)", "EMC Documentum Administrator 6.7SP1(\u003cP31)", "EMC Documentum Administrator 6.7SP2(\u003cP23)", "EMC Documentum Administrator 7.0(\u003cP18)", "EMC Documentum Administrator 7.1(\u003cP15)", "EMC Documentum Administrator 7.2(\u003cP01)", "EMC Documentum Digital Assets Manager 6.5SP6(\u003cP25)", "EMC Documentum Web Publishers 6.5 SP7(\u003cP25)", "EMC Documentum Task Space 6.7SP1(\u003cP31)", "EMC Documentum Task Space 6.7SP2(\u003cP23)" ] }, "referenceLink": "http://www.securityfocus.com/archive/1/535897", "serverity": "\u4e2d", "submitTime": "2015-07-03", "title": "EMC\u591a\u6b3e\u4ea7\u54c1\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…