cvelist/2022/21xxx/CVE-2022-21630.json

68 lines
3.6 KiB
JSON
Raw Normal View History

Oracle 2022 October CPU On branch cna/Oracle/CPU2022Oct Changes to be committed: modified: 2022/21xxx/CVE-2022-21587.json modified: 2022/21xxx/CVE-2022-21589.json modified: 2022/21xxx/CVE-2022-21590.json modified: 2022/21xxx/CVE-2022-21591.json modified: 2022/21xxx/CVE-2022-21592.json modified: 2022/21xxx/CVE-2022-21593.json modified: 2022/21xxx/CVE-2022-21594.json modified: 2022/21xxx/CVE-2022-21595.json modified: 2022/21xxx/CVE-2022-21596.json modified: 2022/21xxx/CVE-2022-21597.json modified: 2022/21xxx/CVE-2022-21598.json modified: 2022/21xxx/CVE-2022-21599.json modified: 2022/21xxx/CVE-2022-21600.json modified: 2022/21xxx/CVE-2022-21601.json modified: 2022/21xxx/CVE-2022-21602.json modified: 2022/21xxx/CVE-2022-21603.json modified: 2022/21xxx/CVE-2022-21604.json modified: 2022/21xxx/CVE-2022-21605.json modified: 2022/21xxx/CVE-2022-21606.json modified: 2022/21xxx/CVE-2022-21607.json modified: 2022/21xxx/CVE-2022-21608.json modified: 2022/21xxx/CVE-2022-21609.json modified: 2022/21xxx/CVE-2022-21610.json modified: 2022/21xxx/CVE-2022-21611.json modified: 2022/21xxx/CVE-2022-21612.json modified: 2022/21xxx/CVE-2022-21613.json modified: 2022/21xxx/CVE-2022-21614.json modified: 2022/21xxx/CVE-2022-21615.json modified: 2022/21xxx/CVE-2022-21616.json modified: 2022/21xxx/CVE-2022-21617.json modified: 2022/21xxx/CVE-2022-21618.json modified: 2022/21xxx/CVE-2022-21619.json modified: 2022/21xxx/CVE-2022-21620.json modified: 2022/21xxx/CVE-2022-21621.json modified: 2022/21xxx/CVE-2022-21622.json modified: 2022/21xxx/CVE-2022-21623.json modified: 2022/21xxx/CVE-2022-21624.json modified: 2022/21xxx/CVE-2022-21625.json modified: 2022/21xxx/CVE-2022-21626.json modified: 2022/21xxx/CVE-2022-21627.json modified: 2022/21xxx/CVE-2022-21628.json modified: 2022/21xxx/CVE-2022-21629.json modified: 2022/21xxx/CVE-2022-21630.json modified: 2022/21xxx/CVE-2022-21631.json modified: 2022/21xxx/CVE-2022-21632.json modified: 2022/21xxx/CVE-2022-21633.json modified: 2022/21xxx/CVE-2022-21634.json modified: 2022/21xxx/CVE-2022-21635.json modified: 2022/21xxx/CVE-2022-21636.json modified: 2022/21xxx/CVE-2022-21637.json modified: 2022/21xxx/CVE-2022-21638.json modified: 2022/21xxx/CVE-2022-21639.json modified: 2022/21xxx/CVE-2022-21640.json modified: 2022/21xxx/CVE-2022-21641.json modified: 2022/39xxx/CVE-2022-39399.json modified: 2022/39xxx/CVE-2022-39400.json modified: 2022/39xxx/CVE-2022-39401.json modified: 2022/39xxx/CVE-2022-39402.json modified: 2022/39xxx/CVE-2022-39403.json modified: 2022/39xxx/CVE-2022-39404.json modified: 2022/39xxx/CVE-2022-39405.json modified: 2022/39xxx/CVE-2022-39406.json modified: 2022/39xxx/CVE-2022-39407.json modified: 2022/39xxx/CVE-2022-39408.json modified: 2022/39xxx/CVE-2022-39409.json modified: 2022/39xxx/CVE-2022-39410.json modified: 2022/39xxx/CVE-2022-39411.json modified: 2022/39xxx/CVE-2022-39412.json modified: 2022/39xxx/CVE-2022-39417.json modified: 2022/39xxx/CVE-2022-39419.json modified: 2022/39xxx/CVE-2022-39420.json modified: 2022/39xxx/CVE-2022-39421.json modified: 2022/39xxx/CVE-2022-39422.json modified: 2022/39xxx/CVE-2022-39423.json modified: 2022/39xxx/CVE-2022-39424.json modified: 2022/39xxx/CVE-2022-39425.json modified: 2022/39xxx/CVE-2022-39426.json modified: 2022/39xxx/CVE-2022-39427.json modified: 2022/39xxx/CVE-2022-39428.json
2022-10-18 13:48:11 -07:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2022-21630"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "JD Edwards EnterpriseOne Tools",
"version": {
"version_data": [
{
"version_value": "9.2.6.4 and prior",
"version_affected": "="
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html"
}
]
}
}