OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/96216 | |
| https://www.exploit-db.com/exploits/41366/ | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/96216 | |
| https://www.exploit-db.com/exploits/41366/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2017-02-22 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-5586
Mitre link : CVE-2017-5586
CVE.ORG link : CVE-2017-5586
JSON object : View
Products Affected
                opentext
- documentum_d2
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
