cve/2017/CVE-2017-3232.md

19 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-3232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3232)
![](https://img.shields.io/static/v1?label=Product&message=Automatic%20Service%20Request%20(ASR)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%205.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20%22exploitable%22%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Automatic%20Service%20Request%20(ASR)%20executes%20to%20compromise%20Automatic%20Service%20Request%20(ASR).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Automatic%20Service%20Request%20(ASR)%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
2024-06-09 00:33:16 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.