Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36161 | OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root. |
Wed, 22 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-732 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-22T14:51:08.038Z
Reserved: 2023-04-29T00:00:00.000Z
Link: CVE-2023-31871
Updated: 2024-08-02T15:03:28.855Z
Status : Modified
Published: 2023-05-18T17:15:08.957
Modified: 2025-01-22T15:15:09.237
Link: CVE-2023-31871
No data.
OpenCVE Enrichment
No data.
EUVD