René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

85 lines
3.5 KiB
JSON

{
"id": "CVE-2022-21591",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:11.247",
"lastModified": "2022-10-20T04:32:59.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: UI Infrastructure). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Transportation Management. CVSS 3.1 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el producto Oracle Transportation Management de Oracle Supply Chain (componente: UI Infrastructure). Las versiones soportadas que est\u00e1n afectadas son 6.4.3 y 6.5.1. Una vulnerabilidad explotable f\u00e1cilmente permite a un atacante poco privilegiado y acceso a la red por medio de HTTP comprometer a Oracle Transportation Management. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en una actualizaci\u00f3n no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de Oracle Transportation Management y la capacidad no autorizada para causar una denegaci\u00f3n parcial de servicio (DOS parcial) de Oracle Transportation Management. CVSS 3.1 Puntuaci\u00f3n Base 5.4 (Impactos en la Integridad y la Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:transportation_management:6.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16F87413-69B4-4B1F-AFE6-5D711851F60F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:transportation_management:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5681B968-E3E4-41AA-A1FA-3C95854C9AA7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}