cvelist/2025/21xxx/CVE-2025-21545.json

85 lines
3.4 KiB
JSON
Raw Normal View History

2024-12-25 00:00:56 +00:00
{
2025-01-21 21:00:58 +00:00
"data_version": "4.0",
2024-12-25 00:00:56 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-21545",
2025-01-21 21:00:58 +00:00
"ASSIGNER": "secalert_us@oracle.com",
"STATE": "PUBLIC"
2024-12-25 00:00:56 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-01-21 21:00:58 +00:00
"value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: OpenSearch). Supported versions that are affected are 8.60 and 8.61. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools."
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Oracle Corporation",
"product": {
"product_data": [
{
"product_name": "PeopleSoft Enterprise PeopleTools",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "8.60"
},
{
"version_affected": "=",
"version_value": "8.61"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
},
"impact": {
"cvss": [
{
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH"
2024-12-25 00:00:56 +00:00
}
]
}
}