René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

152 lines
6.1 KiB
JSON

{
"id": "CVE-2017-3485",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2017-04-24T19:59:02.347",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Oracle FLEXCUBE Universal Banking de Oracle Financial Services Applications (subcomponente: Infrastructure). Versiones compatibles que son afectadas son 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 y 12.2.0. Vulnerabilidad dificil de explotar permite a atacantes de bajo privilegio con acceso a la red a trav\u00e9s de HTTP comprometer Oracle FLEXCUBE Universal Banking. Los ataques exitosos de esta vulnerabilidad pueden resultar en la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n no autorizada de acceso a datos cr\u00edticos o todos los datos accesibles de Oracle FLEXCUBE Universal Banking y capacidad no autorizada para causar un bloqueo o repetici\u00f3n frecuente de Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 6.8 (Integridad e Impactos de disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDAB2438-6836-4632-A344-3486F0661D17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4703D070-2171-4501-9EF1-A417AB111D95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9582BE-825E-4427-A3D9-39857AAC9D70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "501D0455-4A7E-496A-9D92-CD2A0E9ECC62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "097B84AB-C16F-48B4-BFCE-DB87D607EC5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "77C313ED-A2A5-4BD2-B88F-F8F5DA2DAFAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E9EF4050-D40E-4D2E-91B9-5387B2464208"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA52AE9-989E-40B4-A9CF-9E45EABEB54B"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/97743",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1038304",
"source": "secalert_us@oracle.com"
}
]
}