cve/2022/CVE-2022-21511.md

18 lines
1.6 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-21511](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21511)
![](https://img.shields.io/static/v1?label=Product&message=Database%20-%20Enterprise%20Edition&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20None%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20EXECUTE%20ON%20DBMS_IR.EXECUTESQLSCRIPT%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Database%20-%20Enterprise%20Edition%20Recovery.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Database%20-%20Enterprise%20Edition%20Recovery.&color=brighgreen)
### Description
Vulnerability in the Oracle Database - Enterprise Edition Recovery component of Oracle Database Server. For supported versions that are affected see note. Easily exploitable vulnerability allows high privileged attacker having EXECUTE ON DBMS_IR.EXECUTESQLSCRIPT privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition Recovery. Successful attacks of this vulnerability can result in takeover of Oracle Database - Enterprise Edition Recovery. Note: None of the supported versions are affected. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujul2022.html
#### Github
No PoCs found on GitHub currently.