mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
120 lines
4.2 KiB
JSON
120 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2008-2589",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-07-15T23:41:00.000",
|
|
"lastModified": "2018-10-11T20:41:55.210",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3, 10.1.2.2, and 10.1.4.1 has unknown impact and remote attack vectors. NOTE: the previous information was obtained from the Oracle July 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability in the WWV_RENDER_REPORT package that allows remote attackers to execute arbitrary SQL (PL/SQL) commands via the second argument to the SHOW procedure."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad no especificada en el componente Oracle Portal en Application Server de Oracle versiones 9.0.4.3, 10.1.2.2 y 10.1.4.1, presenta un impacto desconocido y vectores de ataque remotos. NOTA: la informaci\u00f3n anterior fue obtenida de la CPU de julio de 2008 de Oracle. Oracle no ha comentado sobre las afirmaciones de un investigador confiable de que este problema es una vulnerabilidad de inyecci\u00f3n SQL en el paquete WWV_RENDER_REPORT que permite a atacantes remotos ejecutar comandos SQL (PL/SQL) arbitrarios por medio del segundo argumento en el procedimiento SHOW."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.4
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CA9867F-D7BC-4230-9584-C2FBB6642482"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B0223F3-A9D4-4A4F-8934-761D83CD5494"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:application_server:10.1.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9A3EA86-0C95-4260-8E11-ECCE161BDF5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:oracle_portal_component:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A66638E5-CDC3-42B5-A03E-283129C8A475"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/494410/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1020494",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/2109/references",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/2115",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |