CNVD-2015-04322
Vulnerability from cnvd - Published: 2015-07-08
VLAI Severity ?
Title
EMC多款产品任意文件上传漏洞
Description
EMC Documentum是一款企业文档和图像管理工具,使文档的创建、修改、跟踪和在业务过程中的利用变得高效、规范和严谨
EMC多款产品存在任意文件上传漏洞,攻击者利用这些漏洞可向后端内容服务器上传任意类型的文件。
Severity
高
Patch Name
EMC多款产品任意文件上传漏洞的补丁
Patch Description
EMC Documentum是一款企业文档和图像管理工具,使文档的创建、修改、跟踪和在业务过程中的利用变得高效、规范和严谨。EMC多款产品存在任意文件上传漏洞,攻击者利用这些漏洞可向后端内容服务器上传任意类型的文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://emc.subscribenet.com/control/dctm/download?element=3887191
Reference
http://www.securityfocus.com/archive/1/535897
Impacted products
| Name | ['EMC Documentum Webtop 6.7SP1(<P310', 'EMC Documentum Webtop 6.7SP2(<P23)', 'EMC Documentum Webtop 6.8(<P01)', 'EMC Documentum Administrator 6.7SP1(<P31)', 'EMC Documentum Administrator 6.7SP2(<P23)', 'EMC Documentum Administrator 7.0(<P18)', 'EMC Documentum Administrator 7.1(<P15)', 'EMC Documentum Administrator 7.2(<P01)', 'EMC Documentum Digital Assets Manager 6.5SP6(<P25)', 'EMC Documentum Web Publishers 6.5 SP7(<P25)', 'EMC Documentum Task Space 6.7SP1(<P31)', 'EMC Documentum Task Space 6.7SP2(<P23)'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-4524"
}
},
"description": "EMC Documentum\u662f\u4e00\u6b3e\u4f01\u4e1a\u6587\u6863\u548c\u56fe\u50cf\u7ba1\u7406\u5de5\u5177\uff0c\u4f7f\u6587\u6863\u7684\u521b\u5efa\u3001\u4fee\u6539\u3001\u8ddf\u8e2a\u548c\u5728\u4e1a\u52a1\u8fc7\u7a0b\u4e2d\u7684\u5229\u7528\u53d8\u5f97\u9ad8\u6548\u3001\u89c4\u8303\u548c\u4e25\u8c28\r\n\r\nEMC\u591a\u6b3e\u4ea7\u54c1\u5b58\u5728\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u53ef\u5411\u540e\u7aef\u5185\u5bb9\u670d\u52a1\u5668\u4e0a\u4f20\u4efb\u610f\u7c7b\u578b\u7684\u6587\u4ef6\u3002",
"discovererName": "EMC",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://emc.subscribenet.com/control/dctm/download?element=3887191",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-04322",
"openTime": "2015-07-08",
"patchDescription": "EMC Documentum\u662f\u4e00\u6b3e\u4f01\u4e1a\u6587\u6863\u548c\u56fe\u50cf\u7ba1\u7406\u5de5\u5177\uff0c\u4f7f\u6587\u6863\u7684\u521b\u5efa\u3001\u4fee\u6539\u3001\u8ddf\u8e2a\u548c\u5728\u4e1a\u52a1\u8fc7\u7a0b\u4e2d\u7684\u5229\u7528\u53d8\u5f97\u9ad8\u6548\u3001\u89c4\u8303\u548c\u4e25\u8c28\u3002EMC\u591a\u6b3e\u4ea7\u54c1\u5b58\u5728\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u53ef\u5411\u540e\u7aef\u5185\u5bb9\u670d\u52a1\u5668\u4e0a\u4f20\u4efb\u610f\u7c7b\u578b\u7684\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "EMC\u591a\u6b3e\u4ea7\u54c1\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"EMC Documentum Webtop 6.7SP1(\u003cP310",
"EMC Documentum Webtop 6.7SP2(\u003cP23)",
"EMC Documentum Webtop 6.8(\u003cP01)",
"EMC Documentum Administrator 6.7SP1(\u003cP31)",
"EMC Documentum Administrator 6.7SP2(\u003cP23)",
"EMC Documentum Administrator 7.0(\u003cP18)",
"EMC Documentum Administrator 7.1(\u003cP15)",
"EMC Documentum Administrator 7.2(\u003cP01)",
"EMC Documentum Digital Assets Manager 6.5SP6(\u003cP25)",
"EMC Documentum Web Publishers 6.5 SP7(\u003cP25)",
"EMC Documentum Task Space 6.7SP1(\u003cP31)",
"EMC Documentum Task Space 6.7SP2(\u003cP23)"
]
},
"referenceLink": "http://www.securityfocus.com/archive/1/535897",
"serverity": "\u9ad8",
"submitTime": "2015-07-03",
"title": "EMC\u591a\u6b3e\u4ea7\u54c1\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…