{ "id": "CVE-2019-2941", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-10-16T18:15:29.653", "lastModified": "2024-11-21T04:41:50.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Hyperion Profitability and Cost Management product of Oracle Hyperion (component: Modeling). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Profitability and Cost Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Profitability and Cost Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Profitability and Cost Management accessible data as well as unauthorized read access to a subset of Hyperion Profitability and Cost Management accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N)." }, { "lang": "es", "value": "Vulnerabilidad en el producto Hyperion de rentabilidad y gesti\u00f3n de costos de Oracle Hyperion (component: Modeling) La versi\u00f3n compatible que est\u00e1 afectada es 11.1.2.4. La vulnerabilidad dif\u00edcil de explotar permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de HTTP comprometa la rentabilidad y la gesti\u00f3n de costos de Hyperion. Los ataques con \u00e9xito requieren la interacci\u00f3n humana de una persona que no sea el atacante y, si bien la vulnerabilidad se encuentra en la gesti\u00f3n de rentabilidad y costos de Hyperion, los ataques pueden afectar significativamente a productos adicionales. Los ataques con \u00e9xito de esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de la Administraci\u00f3n de Costos y Rentabilidad de Hyperion, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de la Administraci\u00f3n de Costos y Rentabilidad de Hyperion. CVSS 3.0 Base Score 4.0 (Impactos de confidencialidad e integridad). Vector CVSS: (CVSS: 3.0 / AV: N / AC: H / PR: H / UI: R / S: C / C: L / I: L / A: N)." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.0, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 1.0, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N", "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:hyperion_enterprise_performance_management_architect:11.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "1024E4C8-82AB-4367-9A3C-0C080F2ED7CB" } ] } ] } ], "references": [ { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] } ] }