René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

147 lines
5.9 KiB
JSON

{
"id": "CVE-2020-2569",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-01-15T17:15:18.253",
"lastModified": "2022-07-28T14:32:27.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Applications DBA component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Oracle Applications DBA executes to compromise Oracle Applications DBA. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Applications DBA. CVSS 3.0 Base Score 3.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente DBA de Oracle Applications de Oracle Database Server. Las versiones compatibles que se ven afectadas son 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c y 19c. La vulnerabilidad f\u00e1cilmente explotable permite que el atacante con pocos privilegios tenga privilegios de inicio de sesi\u00f3n local con el inicio de sesi\u00f3n en la infraestructura donde se ejecuta Oracle Applications DBA para comprometer Oracle Applications DBA. Los ataques con \u00e9xito requieren la interacci\u00f3n humana de una persona que no sea el atacante. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en una actualizaci\u00f3n no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de Oracle Applications DBA y la capacidad no autorizada de causar una denegaci\u00f3n parcial de servicio (parcial de DOS) de Oracle Applications DBA. Puntaje b\u00e1sico de CVSS 3.0 3.9 (impactos de integridad y disponibilidad). Vector CVSS: (CVSS: 3.0 / AV: L / AC: L / PR: L / UI: R / S: U / C: N / I: L / A: L)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 2.5
}
],
"cvssMetricV30": [
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:applications_dba:11.2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "720E114A-3FA1-4E49-B552-CC9039137EAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:applications_dba:12.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F124015D-CFA4-46EB-8012-1AB082071C94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:applications_dba:12.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B878C8ED-DA6C-44D0-BCA6-985C643353C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:applications_dba:18c:*:*:*:*:*:*:*",
"matchCriteriaId": "72C620C9-D87A-4890-8EDB-E952F6DF7F6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:applications_dba:19c:*:*:*:*:*:*:*",
"matchCriteriaId": "C4164865-E582-4700-96FA-638E38066C03"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}