CVE-2024-5201

8.8 HIGH

📋 TL;DR

CVE-2024-5201 is an authentication bypass vulnerability in OpenText Dimensions RM that allows authenticated users to escalate their privileges to those of other users via HTTP requests. This affects all organizations running vulnerable versions of OpenText Dimensions RM, potentially enabling unauthorized access to sensitive data and administrative functions.

💻 Affected Systems

Products:
  • OpenText Dimensions RM
Versions: All versions prior to the fix
Operating Systems: All supported operating systems for Dimensions RM
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges, accesses all sensitive data, modifies configurations, and potentially compromises the entire Dimensions RM environment and connected systems.

🟠

Likely Case

Attackers escalate to higher-privileged user accounts to access sensitive project data, intellectual property, or financial information stored in Dimensions RM.

🟢

If Mitigated

With proper network segmentation, strict access controls, and monitoring, impact is limited to the Dimensions RM application with no lateral movement to other systems.

🌐 Internet-Facing: HIGH if Dimensions RM is exposed to the internet, as authenticated users can exploit this remotely to gain elevated privileges.
🏢 Internal Only: HIGH as authenticated internal users can exploit this vulnerability to escalate privileges within the application.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via HTTP requests. The CWE-287 classification indicates improper authentication mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check the Micro Focus knowledge base for specific patched versions

Vendor Advisory: https://portal.microfocus.com/s/article/KM000029985

Restart Required: Yes

Instructions:

1. Review the Micro Focus advisory KM000029985. 2. Download and apply the appropriate patch for your Dimensions RM version. 3. Restart the Dimensions RM service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Dimensions RM to only trusted IP addresses and users who require access.

Enhanced Authentication

all

Implement multi-factor authentication and strict session management to reduce the risk of authenticated attacks.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Dimensions RM from critical systems
  • Enforce principle of least privilege for all user accounts and monitor for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check your Dimensions RM version against the affected versions listed in the Micro Focus advisory KM000029985.

Check Version:

Check the Dimensions RM administration console or configuration files for version information.

Verify Fix Applied:

Verify you have applied the patch version specified in the advisory and test that privilege escalation attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • HTTP requests attempting to access unauthorized user contexts
  • Authentication logs showing users accessing resources beyond their permissions

Network Indicators:

  • HTTP requests with unusual parameters targeting user privilege manipulation
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="dimensions_rm" AND (event_type="authentication" OR event_type="authorization") AND (status="failure" OR user_change="true")

🔗 References

📤 Share & Export