### [CVE-2018-2882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2882) ![](https://img.shields.io/static/v1?label=Product&message=MICROS%20Retail-J&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%2010.2.x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20MICROS%20Retail-J.%20%20While%20the%20vulnerability%20is%20in%20MICROS%20Retail-J%2C%20attacks%20may%20significantly%20impact%20additional%20products.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20MICROS%20Retail-J%20accessible%20data.&color=brighgreen) ### Description Vulnerability in the MICROS Retail-J component of Oracle Retail Applications (subcomponent: Interfaces). Supported versions that are affected are 10.2.x, 11.0.x, 12.0.x,12.1.x, 12.1.1.x,12.1.2.x and 13.1.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Retail-J. While the vulnerability is in MICROS Retail-J, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MICROS Retail-J accessible data. CVSS 3.0 Base Score 7.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N). ### POC #### Reference - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html #### Github No PoCs found on GitHub currently.