cve/2018/CVE-2018-3312.md

18 lines
2.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3312)
![](https://img.shields.io/static/v1?label=Product&message=Retail%20Customer%20Management%20and%20Segmentation%20Foundation&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2016.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Retail%20Customer%20Engagement.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Retail%20Customer%20Engagement%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Retail%20Customer%20Engagement%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Retail%20Customer%20Engagement.&color=brighgreen)
### Description
Vulnerability in the Oracle Retail Customer Engagement component of Oracle Retail Applications (subcomponent: Segment). Supported versions that are affected are 16.0 and 17.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Retail Customer Engagement. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Retail Customer Engagement accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Engagement accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Customer Engagement. CVSS 3.0 Base Score 5.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
#### Github
No PoCs found on GitHub currently.