Gesamte Überschrift: Opentext Documentum Content Server Privilege Escalation Exploit Kategorie: web applications Betriebssystem: multiple Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains a design gap that allows any authenticated user the ability to replace content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges. # 0day.today @ http://0day.today/