An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The action xmlexport accepts the parameter requestContext. If this parameter is present, the response includes most of the HTTP headers sent to the server and some of the CGI variables like remote_adde and server_name, which is an information disclosure.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jan/14 | Exploit Mailing List Third Party Advisory |
https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-01-18T00:00:00
Updated: 2023-01-20T00:00:00
Reserved: 2022-11-27T00:00:00
Link: CVE-2022-45925
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-01-18T21:15:10.897
Modified: 2023-01-26T19:11:47.677
Link: CVE-2022-45925
JSON object: View
Redhat Information
No data.
CWE