cve/2018/CVE-2018-3120.md

18 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3120)
![](https://img.shields.io/static/v1?label=Product&message=MICROS%20Lucas&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.9.5.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20MICROS%20Lucas.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20MICROS%20Lucas.&color=brighgreen)
### Description
Vulnerability in the MICROS Lucas component of Oracle Retail Applications (subcomponent: Security). Supported versions that are affected are 2.9.5.6 and 2.9.5.7. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Lucas. Successful attacks of this vulnerability can result in takeover of MICROS Lucas. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
#### Github
No PoCs found on GitHub currently.