Vulnerability Details : CVE-2015-4535
Java Method Server (JMS) in EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02, when __debug_trace__ is configured, allows remote authenticated users to gain super-user privileges by leveraging the ability to read a log file containing a login ticket.
Products affected by CVE-2015-4535
- cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.7:sp2:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:7.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-4535
0.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-4535
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:M/Au:S/C:P/I:P/A:C |
6.8
|
8.5
|
NIST |
CWE ids for CVE-2015-4535
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-4535
-
http://seclists.org/bugtraq/2015/Aug/86
Bugtraq: ESA-2015-131: EMC Documentum Content Server Multiple Vulnerabilities
-
http://www.securityfocus.com/bid/76409
EMC Documentum Content Server CVE-2015-4535 Remote Privilege Escalation Vulnerability
-
http://www.securitytracker.com/id/1033296
EMC Documentum Bugs Let Remote Authenticated Users Obtain Passwords, Gain Elevated Privileges, and Execute Arbitrary Code - SecurityTracker
Jump to