CVE-2022-45925

An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The action xmlexport accepts the parameter requestContext. If this parameter is present, the response includes most of the HTTP headers sent to the server and some of the CGI variables like remote_adde and server_name, which is an information disclosure.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentext:opentext_extended_ecm:*:*:*:*:*:*:*:*

History

04 Apr 2025, 18:15

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/14 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/14 - Exploit, Mailing List, Third Party Advisory
References (MISC) https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ - Exploit, Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/ - Exploit, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2023-01-18 21:15

Updated : 2025-04-04 18:15


NVD link : CVE-2022-45925

Mitre link : CVE-2022-45925


JSON object : View

Products Affected

opentext

  • opentext_extended_ecm