EMC Documentum Administrator 5.2.5 File Upload dmcltrace.jsp input validation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.3 | $5k-$25k | 0.00 |
Summary
A vulnerability was found in EMC Documentum Administrator 5.2.5. It has been declared as critical. This affects an unknown part of the file dmcltrace.jsp of the component File Upload. Executing a manipulation can lead to input validation. This vulnerability is registered as CVE-2008-0656. No exploit is available.
Details
A vulnerability has been found in EMC Documentum Administrator 5.2.5 (Content Management System) and classified as very critical. This vulnerability affects some unknown processing of the file dmcltrace.jsp of the component File Upload. The manipulation with an unknown input leads to a input validation vulnerability. The CWE definition for the vulnerability is CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Unrestricted file upload vulnerability in dmclTrace.jsp in EMC Documentum Administrator 5.3.0.313 and Webtop 5.3.0.317 allows remote attackers to overwrite arbitrary files via the filename attribute.
The weakness was published 02/07/2008 (Website). The advisory is shared for download at vupen.com. This vulnerability was named CVE-2008-0656 since 02/07/2008. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 06/01/2025).
It is declared as proof-of-concept. By approaching the search of inurl:dmcltrace.jsp it is possible to find vulnerable targets with Google Hacking. The commercial vulnerability scanner Qualys is able to test this issue with plugin 12821 (Documentum Products "dmclTrace.jsp" Arbitrary File Overwrite Vulnerability).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (40277), SecurityFocus (BID 27632†), Secunia (SA28810†), SecurityTracker (ID 1019305†) and Vulnerability Center (SBV-44996†). Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.dellemc.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.3
VulDB Base Score: 9.8
VulDB Temp Score: 9.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
ISS Proventia IPS: 🔍
Timeline
02/05/2008 🔍02/05/2008 🔍
02/05/2008 🔍
02/06/2008 🔍
02/07/2008 🔍
02/07/2008 🔍
02/07/2008 🔍
06/16/2014 🔍
03/16/2015 🔍
06/01/2025 🔍
Sources
Vendor: dellemc.comAdvisory: vupen.com⛔
Status: Confirmed
CVE: CVE-2008-0656 (🔍)
GCVE (CVE): GCVE-0-2008-0656
GCVE (VulDB): GCVE-100-40900
X-Force: 40277
SecurityFocus: 27632 - Documentum Products 'dmclTrace.jsp' Arbitrary File Overwrite Vulnerability
Secunia: 28810 - Documentum Administrator/Webtop "dmclTrace.jsp" Arbitrary File Overwrite, Highly Critical
SecurityTracker: 1019305 - EMC Documentum 'dmclTrace.jsp' Bug Lets Remote Users Upload Arbitrary Files and Execute Arbitrary Code
Vulnerability Center: 44996 - EMC Documentum Administrator and Documentum Webtop Remote File System Write via Filename Attribute, Critical
Vupen: ADV-2008-0439
Entry
Created: 03/16/2015 13:43Updated: 06/01/2025 15:29
Changes: 03/16/2015 13:43 (60), 05/31/2017 08:44 (10), 06/01/2025 15:29 (18)
Complete: 🔍
Cache ID: 216::103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.