René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
4.0 KiB
JSON

{
"id": "CVE-2016-0489",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2016-01-21T03:00:37.540",
"lastModified": "2016-12-22T14:39:23.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Test Manager for Web Apps. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the ActionServlet servlet, which allows remote authenticated users to upload and execute arbitrary files via directory traversal sequences in the tempfilename parameter in a ReportImage action."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Oracle Application Testing Suite en Oracle Enterprise Manager Grid Control 12.4.0.2 y 12.5.0.2 permite a usuarios remotos autenticados afectar a la confidencialidad, la integridad y la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Test Manager for Web Apps. NOTA: la informaci\u00f3n anterior es de la CPU de Enero de 2016. Oracle no ha comentado sobre las reclamaciones de terceros que esto es una vulnerabilidad de salto de directorio en el servlet ActionServlet, lo que permite a usuarios remotos autenticados cargar y ejecutar archivos arbitrarios a trav\u00e9s de secuencias de salto de directorio en el par\u00e1metro tempfilename en una acci\u00f3n ReportImage."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_testing_suite:12.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "08F3E8E4-BD91-4220-B710-960A45C232D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_testing_suite:12.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "62E818A9-663D-4AFB-B3D6-686CE4DB9676"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/81184",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1034734",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-038",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}