Files
CVEs-PoC/2017/CVE-2017-15276.md
T
2024-06-18 02:51:15 +02:00

18 lines
980 B
Markdown

### [CVE-2017-15276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15276)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). When unpacking TAR archives, Content Server fails to verify the contents of an archive, which causes a path traversal vulnerability via symlinks. Because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
### POC
#### Reference
- https://www.exploit-db.com/exploits/43002/
#### Github
No PoCs found on GitHub currently.