Vulnerability Details : CVE-2014-2520
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07, when Oracle Database is used, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and read sensitive database content via a crafted request.
Products affected by CVE-2014-2520
- cpe:2.3:a:emc:documentum_content_server:*:sp2:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:sp3:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.6:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.7:-:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-2520
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-2520
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | AV:N/AC:M/Au:S/C:C/I:N/A:N |
6.8
|
6.9
|
NIST |
CWE ids for CVE-2014-2520
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2520
-
http://www.securityfocus.com/archive/1/533162/30/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/95369
EMC Documentum Content Server DQL injection CVE-2014-2520 Vulnerability Report
-
http://www.securityfocus.com/bid/69274
EMC Documentum Content Server CVE-2014-2520 Documentum Query Language Injection Vulnerability
-
http://www.securitytracker.com/id/1030743
EMC Documentum Content Server Bug Lets Remote Authenticated Users Inject DQL Commands, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker
Jump to