137 lines
5.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-3574",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2017-04-24T19:59:05.177",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: OPERA License code configuration). Supported versions that are affected are 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x and 5.5.1.x. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Oracle Hospitality OPERA 5 Property Services de Oracle Hospitality Applications (subcomponente: configuraci\u00f3n del codigo OPERA License). Versiones compatibles que son afectadas son 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x y 5.5.1.x. Vulnerabilidad f\u00e1cilmente explotable permite que un atacante con privilegios bajos con acceso a la red a trav\u00e9s de HTTP comprometa a Oracle Hospitality OPERA 5 Property Services. Los ataques exitosos de esta vulnerabilidad pueden provocar acceso no autorizado a datos cr\u00edticos o acceso completo a todos los datos accesibles de Oracle Hospitality OPERA 5 Property Services as\u00ed como actualizaciones no autorizadas, insertar o eliminar acceso a algunos de los datos accesibles de Oracle Hospitality OPERA 5 Property Services.CVSS 3.0 Base Score 7.1 (Impactos de confidencialidad e integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE431F81-E85E-42B7-B977-B4076A717C21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "825F9006-E4DD-4583-AAF6-DF73545DF8E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "58E38734-2EB8-4048-9530-B27CC09FD10D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB95F1A-0B62-475A-8883-A84D9E3D294F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9068C68D-B69D-4B6F-8382-A972135C9959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "393A0BE6-5B95-4D01-B78F-0BFB567B08E7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/97866",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}