CVE-2022-45922

An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The request handler for ll.KeepAliveSession sets a valid AdminPwd cookie even when the Web Admin password was not entered. This allows access to endpoints, which require a valid AdminPwd cookie, without knowing the password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentext:opentext_extended_ecm:*:*:*:*:*:*:*:*

History

04 Apr 2025, 18:15

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/14 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/14 - Exploit, Mailing List, Third Party Advisory
References (MISC) https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ - Exploit, Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ - Exploit, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2023-01-18 21:15

Updated : 2025-04-04 18:15


NVD link : CVE-2022-45922

Mitre link : CVE-2022-45922


JSON object : View

Products Affected

opentext

  • opentext_extended_ecm