mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
96 lines
4.0 KiB
JSON
96 lines
4.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert_us@oracle.com",
|
|
"ID": "CVE-2018-2636",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Hospitality Simphony",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.9"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Oracle Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/erpscanteam/CVE-2018-2636",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/erpscanteam/CVE-2018-2636"
|
|
},
|
|
{
|
|
"name": "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/",
|
|
"refsource": "MISC",
|
|
"url": "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
|
},
|
|
{
|
|
"name": "43960",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/43960/"
|
|
},
|
|
{
|
|
"name": "https://erpscan.io/press-center/blog/oracle-micros-pos-breached/",
|
|
"refsource": "MISC",
|
|
"url": "https://erpscan.io/press-center/blog/oracle-micros-pos-breached/"
|
|
},
|
|
{
|
|
"name": "102560",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/102560"
|
|
}
|
|
]
|
|
}
|
|
} |