cve/2023/CVE-2023-31871.md

18 lines
924 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-31871](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31871)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root.
### POC
#### Reference
- https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7
#### Github
No PoCs found on GitHub currently.