XSS and/or a Client Side URL Redirect exists in OpenText Documentum Webtop 5.3 SP2. The parameter startat in "/webtop/help/en/default.htm" is vulnerable.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/151582/OpenText-Documentum-Webtop-5.3-SP2-Open-Redirect.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Feb/26 | Exploit Mailing List Third Party Advisory |
https://www.opentext.com/products-and-solutions/products/opentext-product-offerings-catalog/rebranded-products/documentum | Product |
http://packetstormsecurity.com/files/151582/OpenText-Documentum-Webtop-5.3-SP2-Open-Redirect.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Feb/26 | Exploit Mailing List Third Party Advisory |
https://www.opentext.com/products-and-solutions/products/opentext-product-offerings-catalog/rebranded-products/documentum | Product |
Configurations
History
No history.
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7416
Mitre link : CVE-2019-7416
CVE.ORG link : CVE-2019-7416
JSON object : View
Products Affected
opentext
- documentum_webtop