Severity Rating: CVE-2012-0398 : CVSS Base Score is 5.8
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
CVE-2012-0404 : CVSS Base Score is 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Vulnerability Summary:
EMC Documentum eRoom contains vulnerabilities that can be potentially
exploited by malicious users to conduct session replay and cross-site
scripting attacks.
Vulnerability Details:
Two vulnerabilities have been identified in EMC Documentum eRoom, which can
be potentially exploited by malicious users to conduct session replay and
cross-site scripting attacks.
1) The eRoom session cookies are set/validated insecurely which may lead to
session hijacking and/or session replay (CVE-2012-0398). CVSS Base Score is
5.8 (AV:A/AC:L/Au:N/C:P/I:P/A:P)
2) eRoom application is vulnerable to DOM-based cross-site-scripting
attacks (CVE-2012-0404). CVSS Base Score is 5.8
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
EMC is also providing additional instructions to customers to further
protect their eRoom environment from cross-site scripting attacks. See KB
article esg127683 available from Powerlink
for more details.
Resolution:
The following EMC Documentum eRoom products contain resolution to these
issues:
eRoom version 7.4.4
EMC strongly recommends all customers upgrade to eRoom 7.4.4 at the
earliest opportunity.
Link to remedies:
Registered EMC Powerlink customers can download software from Powerlink.
For EMC Documentum eRoom Software, navigate in Powerlink to Home > Support
> Software Downloads and Licensing > Downloads D > Documentum eRoom. Also,
follow the instructions in esg127683 to
further harden their eRoom environment.
Credit:
EMC would like to thank SEC Consult
(https://www.sec-consult.com/en/index.html)for providing security and
Documentum eRoom consulting for this release.
Read and use the information in this EMC Security Advisory to assist in
avoiding any situation that might arise from the problems described herein.
If you have any questions regarding this
product alert, contact EMC Software Technical Support at 1-877-534-2867.
For an explanation of Severity Ratings, refer to EMC Knowledgebase solution
emc218831. EMC recommends all customers take into account both the base
score and any relevant temporal and
environmental scores which may impact the potential severity associated
with particular security vulnerability.
EMC Corporation distributes EMC Security Advisories, in order to bring to
the attention of users of the affected EMC products, important security
information. EMC recommends that all users
determine the applicability of this information to their individual
situations and take appropriate action. The information set forth herein is
provided "as is" without warranty of any
kind. EMC disclaims all warranties, either express or implied, including
the warranties of merchantability, fitness for a particular purpose, title
and non-infringement. In no event, shall
EMC or its suppliers, be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if EMC or its suppliers
have been advised of the possibility of such damages. Some states do not
allow the exclusion or limitation of liability for consequential or
incidental damages, so the foregoing limitation
may not apply.
{"id": "SECURITYVULNS:DOC:27768", "bulletinFamily": "software", "title": "ESA-2012-012: EMC Documentum eRoom Multiple Vulnerabilities", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nESA-2012-012: EMC Documentum eRoom multiple vulnerabilities\r\n\r\nEMC Identifier: ESA-2012-012\r\n\r\nCVE Identifiers: CVE-2012-0398, CVE-2012-0404\r\n\r\nSeverity Rating: CVE-2012-0398 : CVSS Base Score is 5.8\r\n(AV:A/AC:L/Au:N/C:P/I:P/A:P)\r\n CVE-2012-0404 : CVSS Base Score is 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)\r\n\r\n\r\nAffected products: \r\nEMC Documentum eRoom versions prior 7.4.4\r\n\r\n\r\nVulnerability Summary: \r\nEMC Documentum eRoom contains vulnerabilities that can be potentially\r\nexploited by malicious users to conduct session replay and cross-site\r\nscripting attacks.\r\n\r\nVulnerability Details: \r\nTwo vulnerabilities have been identified in EMC Documentum eRoom, which can\r\nbe potentially exploited by malicious users to conduct session replay and\r\ncross-site scripting attacks.\r\n\r\n1) The eRoom session cookies are set/validated insecurely which may lead to\r\nsession hijacking and/or session replay (CVE-2012-0398). CVSS Base Score is\r\n5.8 (AV:A/AC:L/Au:N/C:P/I:P/A:P) \r\n2) eRoom application is vulnerable to DOM-based cross-site-scripting\r\nattacks (CVE-2012-0404). CVSS Base Score is 5.8\r\n(AV:N/AC:M/Au:N/C:P/I:P/A:N)\r\nEMC is also providing additional instructions to customers to further\r\nprotect their eRoom environment from cross-site scripting attacks. See KB\r\narticle esg127683 available from Powerlink \r\nfor more details.\r\n\r\n\r\nResolution: \r\nThe following EMC Documentum eRoom products contain resolution to these\r\nissues:\r\n\r\neRoom version 7.4.4\r\n\r\nEMC strongly recommends all customers upgrade to eRoom 7.4.4 at the\r\nearliest opportunity. \r\nLink to remedies:\r\n\r\nRegistered EMC Powerlink customers can download software from Powerlink.\r\nFor EMC Documentum eRoom Software, navigate in Powerlink to Home > Support\r\n> Software Downloads and Licensing > Downloads D > Documentum eRoom. Also,\r\nfollow the instructions in esg127683 to \r\nfurther harden their eRoom environment.\r\n\r\nCredit:\r\n\r\nEMC would like to thank SEC Consult\r\n(https://www.sec-consult.com/en/index.html)for providing security and\r\nDocumentum eRoom consulting for this release.\r\n\r\nRead and use the information in this EMC Security Advisory to assist in\r\navoiding any situation that might arise from the problems described herein.\r\nIf you have any questions regarding this \r\nproduct alert, contact EMC Software Technical Support at 1-877-534-2867.\r\n\r\nFor an explanation of Severity Ratings, refer to EMC Knowledgebase solution\r\nemc218831. EMC recommends all customers take into account both the base\r\nscore and any relevant temporal and \r\nenvironmental scores which may impact the potential severity associated\r\nwith particular security vulnerability.\r\n\r\nEMC Corporation distributes EMC Security Advisories, in order to bring to\r\nthe attention of users of the affected EMC products, important security\r\ninformation. EMC recommends that all users \r\ndetermine the applicability of this information to their individual\r\nsituations and take appropriate action. The information set forth herein is\r\nprovided "as is" without warranty of any \r\nkind. EMC disclaims all warranties, either express or implied, including\r\nthe warranties of merchantability, fitness for a particular purpose, title\r\nand non-infringement. In no event, shall \r\nEMC or its suppliers, be liable for any damages whatsoever including\r\ndirect, indirect, incidental, consequential, loss of business profits or\r\nspecial damages, even if EMC or its suppliers \r\nhave been advised of the possibility of such damages. Some states do not\r\nallow the exclusion or limitation of liability for consequential or\r\nincidental damages, so the foregoing limitation \r\nmay not apply.\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: PGP Desktop 9.12.0 (Build 1035)\r\nCharset: utf-8\r\n\r\nwj8DBQFPX1Gdtjd2rKp+ALwRAnCGAKCozu6ocLroP3gd3c8tOfgcjQ3E1wCg0QWd\r\nc6jhOGCXA50I3RlipzWM3cw=\r\n=bbZp\r\n-----END PGP SIGNATURE-----", "published": "2012-03-18T00:00:00", "modified": "2012-03-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:27768", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2012-0404", "CVE-2012-0398"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:44", "edition": 1, "viewCount": 7, "enchantments": {"score": {"value": 5.9, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-0398", "CVE-2012-0404"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12259"]}], "rev": 4}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2012-0398", "CVE-2012-0404"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12259"]}]}, "exploitation": null, "vulnersScore": 5.9}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645513937}}