mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
145 lines
6.1 KiB
JSON
145 lines
6.1 KiB
JSON
{
|
|
"id": "CVE-2019-2622",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2019-04-23T19:32:51.957",
|
|
"lastModified": "2020-08-24T17:37:01.140",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en el componente de Oracle Service Contracts de Oracle E-Business Suite (subcomponente: Renovaciones). Las versiones compatibles que se ven impactadas son 12.1.1, 12.1.2, versi\u00f3n 12.1.3, versi\u00f3n 12.2.3, versi\u00f3n 12.2.4, versi\u00f3n 12.2.5, versi\u00f3n 12.2.6, versi\u00f3n 12.2.7 y versi\u00f3n 12.2.8. Una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante no autenticado con acceso a la red por medio de HTTP comprometer los Contratos de Servicio de Oracle. Los ataques con \u00e9xito requieren la interacci\u00f3n humana de otra persona que no sea el atacante y, si bien la vulnerabilidad est\u00e1 en los Contratos de Servicio de Oracle, los ataques pueden impactar significativamente en productos adicionales. Los ataques con \u00e9xito de esta vulnerabilidad pueden conllevar a actualizaciones no autorizadas, introducir o suprimir el acceso a algunos de los datos accesibles de los Contratos de Servicios de Oracle. CVSS versi\u00f3n 3.0 Base Score versi\u00f3n 4.7 (Impactos de integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/ S:C/C:N/I:L/A:N)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.7,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31A3AD40-A3B9-441D-818C-6C7B10D6D3B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A37F3D61-B607-4A41-850C-A28F7C1FE3BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA68E451-E38F-4AD9-818F-012F009DC04E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F41484E-6D29-460B-9C9B-398DF91CAC39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A9E793D-8FEF-44DC-82C1-33EC58760F87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B97A3865-DF51-4C0F-A109-78DB67F770A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "782C2A77-0AD5-4AB3-9513-E02B3FB6F935"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7BFB418-0A13-43A1-AD59-8A5F8B67DBE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:service_contracts:12.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8464DC3E-05AD-4A61-9A0C-72594D473E41"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |