8.8
CVSSv3

CVE-2022-45928

Published: 18/01/2023 Updated: 25/01/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

A remote OScript execution issue exists in OpenText Content Suite Platform 22.1 (16.2.19.1803). Multiple endpoints allow the user to pass the parameter htmlFile, which is included in the HTML output rendering pipeline of a request. Because the Content Server evaluates and executes Oscript code in HTML files, it is possible for an malicious user to execute Oscript code. The Oscript scripting language allows the attacker (for example) to manipulate files on the filesystem, create new network connections, or execute OS commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opentext opentext extended ecm

Exploits

OpenText Extended ECM versions 1622 through 223 suffer from arbitrary file deletion, information disclosure, local file inclusion, and privilege escalation vulnerabilities ...