Vulnerability Details : CVE-2015-0517
The D2-API component in EMC Documentum D2 3.1 through SP1, 4.0 and 4.1 before 4.1 P22, and 4.2 before P11 places the MD5 hash of an encryption passphrase in log files, which allows remote authenticated users to obtain sensitive information by reading a file.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2015-0517
Probability of exploitation activity in the next 30 days: 0.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 53 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-0517
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2015-0517
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0517
-
http://www.securitytracker.com/id/1031693
EMC Documentum D2 Bugs Lets Remote Authenticated Users Obtain Sensitive Information and Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/100874
EMC Documentum D2 D2-API information disclosure CVE-2015-0517 Vulnerability Report
-
http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html
Broken Link
-
http://www.securityfocus.com/bid/72501
EMC Documentum D2 CVE-2015-0517 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
Products affected by CVE-2015-0517
- cpe:2.3:a:emc:documentum_d2:3.1:-:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_d2:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_d2:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_d2:3.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_d2:4.0:*:*:*:*:*:*:*