EMC Documentum D2 4.5.x and 4.6.x < 4.7 Multiple Vulnerabilities (ESA-2016-167)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple vulnerabilities.

Description :

The remote host is running a version of EMC Documentum D2 that is
4.5.x or 4.6.x prior to 4.7. It is, therefore, affected by multiple
vulnerabilities :

- A cross-site scripting (XSS) vulnerability exists due to
improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to execute arbitrary script
code in a user's browser session. (CVE-2016-9872)

- A Document Query Language (DQL) injection vulnerability
exists due to a failure to properly sanitize
user-supplied input. An authenticated, remote attacker
can exploit this to inject or manipulate DQL queries in
the back-end database, resulting in the manipulation or
disclosure of arbitrary data. (CVE-2016-9873)

See also :

http://seclists.org/bugtraq/2017/Jan/att-80/ESA-2016-167.txt

Solution :

Upgrade to EMC Documentum D2 version 4.7 or later. Alternatively, note
that EMC has released 4.5.0200 (4.5 patch 20) and 4.6.0080 (4.6 patch
08) to resolve CVE-2016-9872.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 4.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 96961 ()

Bugtraq ID: 95824
95828

CVE ID: CVE-2016-9872
CVE-2016-9873

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now