Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1751 EMC Documentum WebTop Client Products Multiple Vulnerabilities 2 July 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: EMC Documentum WebTop EMC Documentum Capital Projects EMC Documentum Administrator EMC Documentum Digital Assets Manager EMC Documentum Web Publishers EMC Documentum Task Space Publisher: EMC Operating System: Windows OS X Impact/Access: Cross-site Scripting -- Remote with User Interaction Create Arbitrary Files -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-4524 CVE-2015-0551 - --------------------------BEGIN INCLUDED TEXT-------------------- ESA-2015-111: EMC Documentum WebTop Client Products Multiple Vulnerabilities CVE Identifier: CVE-2015-0551, CVE-2015-4524 Severity Rating: CVSS v2 Base Score: See below for CVSSv2 scores for individual CVEs Affected products: EMC Documentum WebTop, versions 6.7SP1, 6.7SP2, 6.8 EMC Documentum Capital Projects 1.8 and 1.9 EMC Documentum Administrator, versions 6.7SP1, 6.7SP2, 7.0, 7.1 and 7.2 EMC Documentum Digital Assets Manager, version 6.5SP6 EMC Documentum Web Publishers, version 6.5 SP7 EMC Documentum Task Space, versions 6.7SP1, 6.7SP2 Summary: Multiple vulnerabilities were fixed in WebTop and its client products. Details: 1. Multiple Cross-Site Scripting Vulnerabilities (CVE-2015-0551) EMC Documentum WebTop based client products contain multiple cross-site scripting vulnerabilities that could potentially be exploited by attackers to inject arbitrary HTML code or scripts, which may get executed in the context of an authenticated user. CVSSv2 Base Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P) 2. Arbitrary File Upload (CVE-2015-4524) EMC Documentum WebTop based client products allow any type of user supplied file to be uploaded to the backend Content Server, which may allow attackers to upload malicious files. CVSSv2 Base Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P) Resolution: The following versions of the affected products contain resolution to the vulnerabilities: EMC Documentum WebTop, versions 6.7SP1P31 or later, 6.7SP2P23 or later, 6.8P01 or later EMC Documentum Administrator, versions 6.7SP1P31 or later, 6.7SP2P23 or later, 7.0P18 or later, 7.1 P15 or later, 7.2P01 or later EMC Documentum Digital Assets Manager, version 6.5SP6P25 or later EMC Documentum Web Publishers, version 6.5SP7P25 or later EMC Documentum Task Space, versions 6.7SP1P31 or later, 6.7SP2P23 or later EMC Documentum Capital Projects 1.8P22 or later on top of WebTop 6.7SP1 P31 or later or WebTop 6.7SP2 P23 or later 1.9P12 or later on top of WebTop 6.7SP2 P23 or later or WebTop 6.8P01 or later. EMC recommends all customers upgrade at the earliest opportunity. Link to remedies: Customers can download the remediated versions from the following locations - EMC Documentum WebTop - 6.7SP1 - https://emc.subscribenet.com/control/dctm/download?element=3887191 6.7SP2 - https://emc.subscribenet.com/control/dctm/download?element=4544381 6.8 - https://emc.subscribenet.com/control/dctm/download?element=5950091 EMC Documentum Capital Projects - 1.8 - https://emc.subscribenet.com/control/dctm/download?element=4928521 1.9 - https://emc.subscribenet.com/control/dctm/download?element=5350311 EMC Documentum Administrator - 6.7SP1 - https://emc.subscribenet.com/control/dctm/download?element=3887141 6.7SP2 - https://emc.subscribenet.com/control/dctm/download?element=4541681 7.0 - https://emc.subscribenet.com/control/dctm/download?element=4787271 7.1 - https://emc.subscribenet.com/control/dctm/download?element=5096401 7.2 - https://emc.subscribenet.com/control/dctm/download?element=6091351 EMC Documentum Digital Assets Manager, version 6.5SP6P25 or later https://emc.subscribenet.com/control/dctm/download?element=4772311 EMC Documentum Web Publishers, version 6.5SP7P25 or later https://emc.subscribenet.com/control/dctm/download?element=4772271 EMC Documentum Task Space - 6.7SP1 - https://emc.subscribenet.com/control/dctm/download?element=3887341 6.7SP2 - https://emc.subscribenet.com/control/dctm/download?element=4544451 Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. EMC Product Security Response Center security_alert@emc.com - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVZSbqn6ZAP0PgtI9AQKH0RAAp58e/aXdWMxOb+tdmR1jdq3m5jOcsbKJ bCibZvJBVFya/2kp0l9pTtFGGeZdXyrvBL60Y4DwVodjiXPM3s7R+XST8HJLVSjK I1l0FdWk7mtgL2TJyoo7CONF1XoTckSe310NOKAvpFbU5vzRzq65h+y+P6ocYXEX 2sBGRxt18VVcD/OrvpEwK3NmDN7zcg1OW2Av869B5d5jnN1L+ngDF6MAWjJNOQ2f T5ZGy5zyBn/0xv+Y7gHT+WRB58jL5n5zFjlZcnFPkMQ1X+Xm3r1w+BY4s1tYGswh jNBcyccF0KkfP6ugMmeukM9hZee6ycm5FfMcDipizzTldsdmxzfm4/IUAFRCh8NR VbMWDcRzb1AAlgHLf0DzUDNpzjAgGq6x4aW123OR7JtOvx+X0VAflQ60AJpNCF9p o7Gu0E/iV+RGt6p4iTX3gdgGeT4w5kFl1K6KYaPHRwltnQ7IrvWiPcvQ137l8bUA X1GsTztWcoID35chUUnlCcpPHXaPuWK11uXNHgw4ZGWpcaqOwEBN3y+jtabsbrk9 K/obkHaa7T6FN4JfR+kP9AgT6uuPBfFvuOcowxjqN5rXu0J3m5SJXVSMIbNyC86j gNvT05otYRM8Mjwf3nCIcZYArLuQ+raJjkUrN3W77HjYAUPN+2F9yZ054V+lCmF0 usCIqOB1IU8= =ZBT8 -----END PGP SIGNATURE-----