cve/2018/CVE-2018-2636.md

48 lines
2.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-2636](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2636)
![](https://img.shields.io/static/v1?label=Product&message=Hospitality%20Simphony&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20Simphony.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Hospitality%20Simphony.&color=brighgreen)
### Description
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
2024-06-09 00:33:16 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
2024-05-26 14:27:05 +02:00
- https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/
2024-06-09 00:33:16 +00:00
- https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/
2024-05-26 14:27:05 +02:00
- https://github.com/erpscanteam/CVE-2018-2636
2024-06-09 00:33:16 +00:00
- https://github.com/erpscanteam/CVE-2018-2636
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/43960/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/43960/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AidoWedo/Awesome-Honeypots
- https://github.com/Correia-jpv/fucking-awesome-honeypots
- https://github.com/Cymmetria/micros_honeypot
- https://github.com/Hackinfinity/Honey-Pots-
- https://github.com/Mehedi-Babu/honeypots_cyber
- https://github.com/Nieuport/-awesome-honeypots-
- https://github.com/Ondrik8/-Security
- https://github.com/Pasyware/Honeypot_Projects
- https://github.com/birdhan/SecurityProduct
- https://github.com/birdhan/Security_Product
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/eric-erki/awesome-honeypots
- https://github.com/erpscanteam/CVE-2018-2636
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/investlab/Awesome-honeypots
- https://github.com/paralax/awesome-honeypots
- https://github.com/paulveillard/cybersecurity-honeypots
- https://github.com/qince1455373819/awesome-honeypots
- https://github.com/sankitanitdgp/san_honeypot_resources
- https://github.com/syedhafiz1234/honeypot-list
- https://github.com/t666/Honeypot
- https://github.com/wisoez/Awesome-honeypots