mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
239 lines
9.0 KiB
JSON
239 lines
9.0 KiB
JSON
{
|
|
"id": "CVE-2018-2967",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2018-07-18T13:29:03.647",
|
|
"lastModified": "2019-10-03T00:03:26.223",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core). Supported versions that are affected are 16.x, 17.x and 18.x. Easily exploitable vulnerability allows physical access to compromise Primavera Unifier. While the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Primavera Unifier accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en el componente Primavera Unifier de Oracle Construction and Engineering Suite (subcomponente: Core). Las versiones soportadas que se han visto afectadas son la 16.x, 17.x y la 18.x. Una vulnerabilidad f\u00e1cilmente explotable permite el acceso f\u00edsico para comprometer la seguridad de Primavera Unifier. Aunque la vulnerabilidad est\u00e1 presente en Primavera Unifier, los ataques podr\u00edan afectar ligeramente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Primavera Unifier. CVSS 3.0 Base Score 5.3 (impactos en la confidencialidad). Vector CVSS: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
|
"attackVector": "PHYSICAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.9,
|
|
"impactScore": 4.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59616B30-49E9-4775-A9D7-86D9979B227D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "898F6E40-9783-41B6-96FB-BA69BF8DA8DE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC2C0D92-5D5E-49DE-B0C3-ED3ED00D9AC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C57B2CD-FA02-4352-8EDC-A0F039DCCEBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AA06714-9E21-49E6-B762-5E578DA3CF6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88121B02-91E8-46F6-90B6-3BF06A81307A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "395DDD33-1BC8-4AA9-8C8A-5B92E7BC24FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "410955BF-FF9F-4AA4-B749-281A60410EF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC99884C-17AD-4C42-B404-4E862175C1A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5659049-8C12-433D-9CE2-90615122CB29"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "737A843D-6B2F-4443-85FF-7B72B46A7251"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4DC11D4E-23D3-49CE-A9B1-68477EF8C6F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7DFBD39-0511-406D-B972-F3F11976229D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:17.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33157281-11A0-4700-99AB-40B7B9C57A9B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA6400AB-A9A5-409D-933B-C678E4BF8C04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ADFDD413-D0EC-4582-9391-F8E3655BD320"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C0969B5-9C6C-4A35-BC77-D38A15214E5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8312A87-403A-493B-84E4-DA970A18329D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17D636F1-C4C2-4D0B-9EFD-4C424CFD8007"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44AF9941-2C86-44F6-8393-7A1B2BFA5E28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8D6C943-BC10-41C0-9B44-5E2CB91233E2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/104823",
|
|
"source": "secalert_us@oracle.com"
|
|
}
|
|
]
|
|
} |