cve/2019/CVE-2019-2825.md

19 lines
1.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-2825](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2825)
![](https://img.shields.io/static/v1?label=Product&message=Applications%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2012.1.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Applications%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Applications%20Manager%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Oracle Applications Manager component of Oracle E-Business Suite (subcomponent: Oracle Diagnostics Interfaces). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.8. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Applications Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2024-06-09 00:33:16 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.