An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Java application server can be used to bypass the authentication of the QDS endpoints of the Content Server. These endpoints can be used to create objects and execute arbitrary code.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jan/13 | Exploit Mailing List Third Party Advisory |
https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-01-18T00:00:00
Updated: 2023-01-20T00:00:00
Reserved: 2022-11-27T00:00:00
Link: CVE-2022-45927
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-01-18T22:15:10.473
Modified: 2023-01-30T15:28:54.280
Link: CVE-2022-45927
JSON object: View
Redhat Information
No data.
CWE