mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
140 lines
5.2 KiB
JSON
140 lines
5.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2017-3556",
|
||
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||
|
"published": "2017-04-24T19:59:04.643",
|
||
|
"lastModified": "2018-12-10T19:29:22.737",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: File Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulnerabilidad en el componente Application Object Library de Oracle E-Business Suite (subcomponente: administraci\u00f3n de archivos). Las versiones compatibles que se ven afectadas son 12.1.3, 12.2.3, 12.2.4, 12.2.5 y 12.2.6. La vulnerabilidad de dif\u00edcil explotaci\u00f3n permite al atacante sin autenticar con acceso a la red por medio de HTTP comprometer a Application Object Library de Oracle. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en un acceso de lectura no autorizado a un subconjunto de datos accesibles de Application Object Library de Oracle. CVSS 3.0 puntuaci\u00f3n base 3.7 (impactos de confidencialidad). Vector CVSS:(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV30": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.0",
|
||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 5.3,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 1.4
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 5.0
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-200"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:application_object_library:12.1.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F7A59435-A033-48BD-AC2A-140DCF6113DF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:application_object_library:12.2.3:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "73BD1423-F7EE-4B53-AE4B-DFA784F685C8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:application_object_library:12.2.4:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C95FED83-21C8-4035-BB1B-3C8A93D4645F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:application_object_library:12.2.5:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "411C3C4C-5513-4F7D-8D58-A39F21F43637"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:oracle:application_object_library:12.2.6:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3118706C-CD62-4E5A-9846-F083ECA5B799"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/97785",
|
||
|
"source": "secalert_us@oracle.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"VDB Entry"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id/1038299",
|
||
|
"source": "secalert_us@oracle.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://erpscan.io/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/",
|
||
|
"source": "secalert_us@oracle.com"
|
||
|
}
|
||
|
]
|
||
|
}
|