755
VMScore

CVE-2017-5586

Published: 22/02/2017 Updated: 01/03/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote malicious users to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opentext documentum d2 4.1

opentext documentum d2 4.4

opentext documentum d2 4.3

opentext documentum d2 4.0

opentext documentum d2 4.2

opentext documentum d2 4.5

opentext documentum d2 4.6

Exploits

/** CVE Identifier: CVE-2017-5586 Vendor: OpenText Affected products: Documentum D2 version 4x Researcher: Andrey B Panfilov Severity Rating: CVSS v3 Base Score: 100 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) Description: Document D2 contains vulnerable BeanShell (bsh) and Apache Commons libraries and accepts serialised data from untrusted sources, w ...
OpenText Documentum D2 version 4x contains vulnerable BeanShell (bsh) and Apache Commons libraries and accepts serialized data from untrusted sources, which leads to remote code execution ...

Github Repositories

Command line tool to interact with Quay Clair

claircli claircli is a command line tool to interact with Quay Clair, which has following functionalities: analyze docker images in local host analyze docker images in remote host analyze docker images in secure/insecure registry support threshold/whitelist for vulnerabilities support fat manifests report to HTML/JSON, the html report is based on template Installation python3