{ "id": "CVE-2021-2113", "sourceIdentifier": "secalert_us@oracle.com", "published": "2021-01-20T15:15:53.067", "lastModified": "2024-11-21T06:02:24.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: On Demand Billing). Supported versions that are affected are 2.9.0.0 and 2.9.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)." }, { "lang": "es", "value": "Vulnerabilidad en el producto Oracle Financial Services Revenue Management and Billing de Oracle Financial Services Applications (componente: On Demand Billing). Las versiones compatibles que est\u00e1n afectadas son 2.9.0.0 y 2.9.0.1. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante poco privilegiado con acceso de red por medio de HTTP comprometer Oracle Financial Services Revenue Management and Billing. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en una actualizaci\u00f3n no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de Oracle Financial Services Revenue Management and Billing. CVSS 3.1 Puntuaci\u00f3n Base 4.3 (Impactos de la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)" } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E126D8C5-3476-4DDB-B111-C7FFBC6BD30B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A58DA52D-95F4-4EA0-A100-D41D6190D3D7" } ] } ] } ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }