mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
106 lines
5.0 KiB
JSON
106 lines
5.0 KiB
JSON
{
|
|
"id": "CVE-2021-2320",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2021-04-22T22:15:17.703",
|
|
"lastModified": "2021-04-29T20:42:30.210",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Vulnerability in the Oracle Cloud Infrastructure Storage Gateway product of Oracle Storage Gateway (component: Management Console). The supported version that is affected is Prior to 1.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Cloud Infrastructure Storage Gateway. While the vulnerability is in Oracle Cloud Infrastructure Storage Gateway, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Cloud Infrastructure Storage Gateway. Note: Updating the Oracle Cloud Infrastructure Storage Gateway to version 1.4 or later will address these vulnerabilities. Download the latest version of Oracle Cloud Infrastructure Storage Gateway from <a href=\" https://www.oracle.com/downloads/cloud/oci-storage-gateway-downloads.html\">here. Refer to Document <a href=\"https://support.oracle.com/rs?type=doc&id=2768897.1\">2768897.1 for more details. CVSS 3.1 Base Score 9.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el producto Oracle Cloud Infrastructure Storage Gateway de Oracle Storage Gateway (componente: Management Console). La versi\u00f3n compatible que est\u00e1 afectada es anterior a la 1.4. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante muy privilegiado con acceso a la red por medio de HTTP comprometer a Oracle Cloud Infrastructure Storage Gateway. Si bien la vulnerabilidad est\u00e1 en Oracle Cloud Infrastructure Storage Gateway, los ataques pueden afectar significativamente a productos adicionales. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la toma de control de Oracle Cloud Infrastructure Storage Gateway. Nota: La actualizaci\u00f3n de Oracle Cloud Infrastructure Storage Gateway a versi\u00f3n 1.4 o posteriores solucionar\u00e1 estas vulnerabilidades. Descargue la \u00faltima versi\u00f3n de Oracle Cloud Infrastructure Storage Gateway desde (a href=\" https://www.oracle.com/downloads/cloud/oci-storage-gateway-downloads.html\"Mhere. Refer to Document a href=\"https://support.oracle.com/rs?type=doc&id=2768897.1\")2768897.1 para m\u00e1s detalles. CVSS 3.1 Puntuaci\u00f3n Base 9.1 (Impactos en la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS: 3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "secalert_us@oracle.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.1,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 6.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:cloud_infrastructure_storage_gateway:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.4",
|
|
"matchCriteriaId": "0A7C7129-2DB9-4423-8998-9C9D50A8F1B9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |