René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

110 lines
4.6 KiB
JSON

{
"id": "CVE-2018-3312",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-04-23T19:32:02.617",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Retail Customer Engagement component of Oracle Retail Applications (subcomponent: Segment). Supported versions that are affected are 16.0 and 17.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Retail Customer Engagement. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Retail Customer Engagement accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Engagement accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Customer Engagement. CVSS 3.0 Base Score 5.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Oracle Retail Customer Engagement de Oracle Retail Applications (subcomponente: segmento). Las versiones compatibles que se ven afectadas son 16.0 y 17.0. Vulnerabilidad dif\u00edcil de explotar que permite a un atacante muy privilegiado con acceso a la red por medio de HTTP comprometer a Oracle Retail Customer Engagement. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n no autorizada de acceso a datos cr\u00edticos o a todos los datos accesibles, as\u00ed como acceso de lectura no autorizada a un subconjunto de datos accesibles de Oracle Retail Customer Engagement y capacidad no autorizada para provocar una Denegaci\u00f3n de Servicio parcial (partial DOS) de Oracle Retail Customer Engagement. CVSS 3.0 Puntuaci\u00f3n Base 5.5 (impactos de confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:h/UI:N/S:U/C:L/I:H/A:L)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 4.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:oracle_retail_customer_engagement:16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58FC240F-9E02-4F0E-A473-29EBE6CE95BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:oracle_retail_customer_engagement:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2967979A-F821-4966-A695-6DD624DA5EB2"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}