cve/2013/CVE-2013-6177.md

19 lines
909 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-6177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6177)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Directory traversal vulnerability in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish Engine, and Enterprise Edition Compuset Engine, allows remote authenticated users to read arbitrary files by leveraging xDashboard access.
### POC
#### Reference
- http://packetstormsecurity.com/files/124070/EMC-Document-Sciences-xPression-XSS-CSRF-Redirect-SQL-Injection.html
- http://www.kb.cert.org/vuls/id/346982
#### Github
No PoCs found on GitHub currently.