An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The request handler for ll.KeepAliveSession sets a valid AdminPwd cookie even when the Web Admin password was not entered. This allows access to endpoints, which require a valid AdminPwd cookie, without knowing the password.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jan/14 | Exploit Mailing List Third Party Advisory |
https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-01-18T00:00:00
Updated: 2023-01-20T00:00:00
Reserved: 2022-11-27T00:00:00
Link: CVE-2022-45922
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-01-18T21:15:10.763
Modified: 2023-01-26T18:45:04.397
Link: CVE-2022-45922
JSON object: View
Redhat Information
No data.
CWE