fkie_cve-2019-2622
Vulnerability from fkie_nvd
Published
2019-04-23 19:32
Modified
2024-11-21 04:41
Severity ?
Summary
Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
References
▶ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | service_contracts | 12.1.1 | |
oracle | service_contracts | 12.1.2 | |
oracle | service_contracts | 12.1.3 | |
oracle | service_contracts | 12.2.3 | |
oracle | service_contracts | 12.2.4 | |
oracle | service_contracts | 12.2.5 | |
oracle | service_contracts | 12.2.6 | |
oracle | service_contracts | 12.2.7 | |
oracle | service_contracts | 12.2.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:service_contracts:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "31A3AD40-A3B9-441D-818C-6C7B10D6D3B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A37F3D61-B607-4A41-850C-A28F7C1FE3BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "EA68E451-E38F-4AD9-818F-012F009DC04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2F41484E-6D29-460B-9C9B-398DF91CAC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E793D-8FEF-44DC-82C1-33EC58760F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "B97A3865-DF51-4C0F-A109-78DB67F770A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "782C2A77-0AD5-4AB3-9513-E02B3FB6F935", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B7BFB418-0A13-43A1-AD59-8A5F8B67DBE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:service_contracts:12.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "8464DC3E-05AD-4A61-9A0C-72594D473E41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)." }, { "lang": "es", "value": "Vulnerabilidad en el componente de Oracle Service Contracts de Oracle E-Business Suite (subcomponente: Renovaciones). Las versiones compatibles que se ven impactadas son 12.1.1, 12.1.2, versi\u00f3n 12.1.3, versi\u00f3n 12.2.3, versi\u00f3n 12.2.4, versi\u00f3n 12.2.5, versi\u00f3n 12.2.6, versi\u00f3n 12.2.7 y versi\u00f3n 12.2.8. Una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante no autenticado con acceso a la red por medio de HTTP comprometer los Contratos de Servicio de Oracle. Los ataques con \u00e9xito requieren la interacci\u00f3n humana de otra persona que no sea el atacante y, si bien la vulnerabilidad est\u00e1 en los Contratos de Servicio de Oracle, los ataques pueden impactar significativamente en productos adicionales. Los ataques con \u00e9xito de esta vulnerabilidad pueden conllevar a actualizaciones no autorizadas, introducir o suprimir el acceso a algunos de los datos accesibles de los Contratos de Servicios de Oracle. CVSS versi\u00f3n 3.0 Base Score versi\u00f3n 4.7 (Impactos de integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/ S:C/C:N/I:L/A:N)." } ], "id": "CVE-2019-2622", "lastModified": "2024-11-21T04:41:14.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-23T19:32:51.957", "references": [ { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…