mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
18 lines
1.9 KiB
Markdown
18 lines
1.9 KiB
Markdown
![]() |
### [CVE-2023-21975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21975)
|
||
|
&color=blue)
|
||
|

|
||
|
.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Application%20Express%20Customers%20Plugin.&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
Vulnerability in the Application Express Customers Plugin product of Oracle Application Express (component: User Account). Supported versions that are affected are Application Express Customers Plugin: 18.2-22.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Application Express Customers Plugin. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Application Express Customers Plugin, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Application Express Customers Plugin. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|