exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

EMC Documentum eRoom Cross Site Scripting

EMC Documentum eRoom Cross Site Scripting
Posted Mar 13, 2012
Site emc.com

EMC Documentum eRoom versions prior to 7.4.4 suffer from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2012-0398, CVE-2012-0404
SHA-256 | 6de937902c35d494f2c737d15c5405e6e0f7cdecd24f8733f79ee51fa271ba9c

EMC Documentum eRoom Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2012-012: EMC Documentum eRoom multiple vulnerabilities

EMC Identifier: ESA-2012-012

CVE Identifiers: CVE-2012-0398, CVE-2012-0404

Severity Rating: CVE-2012-0398 : CVSS Base Score is 5.8
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
CVE-2012-0404 : CVSS Base Score is 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)


Affected products:
EMC Documentum eRoom versions prior 7.4.4


Vulnerability Summary:
EMC Documentum eRoom contains vulnerabilities that can be potentially
exploited by malicious users to conduct session replay and cross-site
scripting attacks.

Vulnerability Details:
Two vulnerabilities have been identified in EMC Documentum eRoom, which can
be potentially exploited by malicious users to conduct session replay and
cross-site scripting attacks.

1) The eRoom session cookies are set/validated insecurely which may lead to
session hijacking and/or session replay (CVE-2012-0398). CVSS Base Score is
5.8 (AV:A/AC:L/Au:N/C:P/I:P/A:P)
2) eRoom application is vulnerable to DOM-based cross-site-scripting
attacks (CVE-2012-0404). CVSS Base Score is 5.8
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
EMC is also providing additional instructions to customers to further
protect their eRoom environment from cross-site scripting attacks. See KB
article esg127683 available from Powerlink
for more details.


Resolution:
The following EMC Documentum eRoom products contain resolution to these
issues:

eRoom version 7.4.4

EMC strongly recommends all customers upgrade to eRoom 7.4.4 at the
earliest opportunity.
Link to remedies:

Registered EMC Powerlink customers can download software from Powerlink.
For EMC Documentum eRoom Software, navigate in Powerlink to Home > Support
> Software Downloads and Licensing > Downloads D > Documentum eRoom. Also,
follow the instructions in esg127683 to
further harden their eRoom environment.

Credit:

EMC would like to thank SEC Consult
(https://www.sec-consult.com/en/index.html)for providing security and
Documentum eRoom consulting for this release.

Read and use the information in this EMC Security Advisory to assist in
avoiding any situation that might arise from the problems described herein.
If you have any questions regarding this
product alert, contact EMC Software Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution
emc218831. EMC recommends all customers take into account both the base
score and any relevant temporal and
environmental scores which may impact the potential severity associated
with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to
the attention of users of the affected EMC products, important security
information. EMC recommends that all users
determine the applicability of this information to their individual
situations and take appropriate action. The information set forth herein is
provided "as is" without warranty of any
kind. EMC disclaims all warranties, either express or implied, including
the warranties of merchantability, fitness for a particular purpose, title
and non-infringement. In no event, shall
EMC or its suppliers, be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if EMC or its suppliers
have been advised of the possibility of such damages. Some states do not
allow the exclusion or limitation of liability for consequential or
incidental damages, so the foregoing limitation
may not apply.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.12.0 (Build 1035)
Charset: utf-8

wj8DBQFPX1Gdtjd2rKp+ALwRAnCGAKCozu6ocLroP3gd3c8tOfgcjQ3E1wCg0QWd
c6jhOGCXA50I3RlipzWM3cw=
=bbZp
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close