CVE-2019-2622 (GCVE-0-2019-2622)

Vulnerability from cvelistv5 – Published: 2019-04-23 18:16 – Updated: 2024-10-02 15:45
VLAI?
Summary
Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
Severity ?
No CVSS data available.
CWE
  • Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data.
Assigner
References
Impacted products
Vendor Product Version
Oracle Corporation Service Contracts Affected: 12.1.1
Affected: 12.1.2
Affected: 12.1.3
Affected: 12.2.3
Affected: 12.2.4
Affected: 12.2.5
Affected: 12.2.6
Affected: 12.2.7
Affected: 12.2.8
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:56:44.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-2622",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:00:37.330093Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T15:45:41.772Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Service Contracts",
          "vendor": "Oracle Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.1"
            },
            {
              "status": "affected",
              "version": "12.1.2"
            },
            {
              "status": "affected",
              "version": "12.1.3"
            },
            {
              "status": "affected",
              "version": "12.2.3"
            },
            {
              "status": "affected",
              "version": "12.2.4"
            },
            {
              "status": "affected",
              "version": "12.2.5"
            },
            {
              "status": "affected",
              "version": "12.2.6"
            },
            {
              "status": "affected",
              "version": "12.2.7"
            },
            {
              "status": "affected",
              "version": "12.2.8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-04-23T18:16:41",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2019-2622",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Service Contracts",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "12.1.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.1.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.1.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.2.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.2.4"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.2.5"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.2.6"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.2.7"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "12.2.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Oracle Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
              "refsource": "MISC",
              "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2019-2622",
    "datePublished": "2019-04-23T18:16:41",
    "dateReserved": "2018-12-14T00:00:00",
    "dateUpdated": "2024-10-02T15:45:41.772Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31A3AD40-A3B9-441D-818C-6C7B10D6D3B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A37F3D61-B607-4A41-850C-A28F7C1FE3BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA68E451-E38F-4AD9-818F-012F009DC04E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F41484E-6D29-460B-9C9B-398DF91CAC39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A9E793D-8FEF-44DC-82C1-33EC58760F87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B97A3865-DF51-4C0F-A109-78DB67F770A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"782C2A77-0AD5-4AB3-9513-E02B3FB6F935\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7BFB418-0A13-43A1-AD59-8A5F8B67DBE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:service_contracts:12.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8464DC3E-05AD-4A61-9A0C-72594D473E41\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el componente de Oracle Service Contracts de Oracle E-Business Suite (subcomponente: Renovaciones). Las versiones compatibles que se ven impactadas son 12.1.1, 12.1.2, versi\\u00f3n 12.1.3, versi\\u00f3n 12.2.3, versi\\u00f3n 12.2.4, versi\\u00f3n 12.2.5, versi\\u00f3n 12.2.6, versi\\u00f3n 12.2.7 y versi\\u00f3n 12.2.8. Una vulnerabilidad f\\u00e1cilmente explotable que permite a un atacante no autenticado con acceso a la red por medio de HTTP comprometer los Contratos de Servicio de Oracle. Los ataques con \\u00e9xito requieren la interacci\\u00f3n humana de otra persona que no sea el atacante y, si bien la vulnerabilidad est\\u00e1 en los Contratos de Servicio de Oracle, los ataques pueden impactar significativamente en productos adicionales. Los ataques con \\u00e9xito de esta vulnerabilidad pueden conllevar a actualizaciones no autorizadas, introducir o suprimir el acceso a algunos de los datos accesibles de los Contratos de Servicios de Oracle. CVSS  versi\\u00f3n 3.0 Base Score  versi\\u00f3n 4.7 (Impactos de integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/ S:C/C:N/I:L/A:N).\"}]",
      "id": "CVE-2019-2622",
      "lastModified": "2024-11-21T04:41:14.093",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N\", \"baseScore\": 4.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2019-04-23T19:32:51.957",
      "references": "[{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "secalert_us@oracle.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-2622\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2019-04-23T19:32:51.957\",\"lastModified\":\"2024-11-21T04:41:14.093\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el componente de Oracle Service Contracts de Oracle E-Business Suite (subcomponente: Renovaciones). Las versiones compatibles que se ven impactadas son 12.1.1, 12.1.2, versi\u00f3n 12.1.3, versi\u00f3n 12.2.3, versi\u00f3n 12.2.4, versi\u00f3n 12.2.5, versi\u00f3n 12.2.6, versi\u00f3n 12.2.7 y versi\u00f3n 12.2.8. Una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante no autenticado con acceso a la red por medio de HTTP comprometer los Contratos de Servicio de Oracle. Los ataques con \u00e9xito requieren la interacci\u00f3n humana de otra persona que no sea el atacante y, si bien la vulnerabilidad est\u00e1 en los Contratos de Servicio de Oracle, los ataques pueden impactar significativamente en productos adicionales. Los ataques con \u00e9xito de esta vulnerabilidad pueden conllevar a actualizaciones no autorizadas, introducir o suprimir el acceso a algunos de los datos accesibles de los Contratos de Servicios de Oracle. CVSS  versi\u00f3n 3.0 Base Score  versi\u00f3n 4.7 (Impactos de integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/ S:C/C:N/I:L/A:N).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A3AD40-A3B9-441D-818C-6C7B10D6D3B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A37F3D61-B607-4A41-850C-A28F7C1FE3BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA68E451-E38F-4AD9-818F-012F009DC04E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F41484E-6D29-460B-9C9B-398DF91CAC39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9E793D-8FEF-44DC-82C1-33EC58760F87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97A3865-DF51-4C0F-A109-78DB67F770A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"782C2A77-0AD5-4AB3-9513-E02B3FB6F935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7BFB418-0A13-43A1-AD59-8A5F8B67DBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:service_contracts:12.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8464DC3E-05AD-4A61-9A0C-72594D473E41\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:56:44.663Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-2622\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-02T14:00:37.330093Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-02T14:01:17.691Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Service Contracts\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.1.1\"}, {\"status\": \"affected\", \"version\": \"12.1.2\"}, {\"status\": \"affected\", \"version\": \"12.1.3\"}, {\"status\": \"affected\", \"version\": \"12.2.3\"}, {\"status\": \"affected\", \"version\": \"12.2.4\"}, {\"status\": \"affected\", \"version\": \"12.2.5\"}, {\"status\": \"affected\", \"version\": \"12.2.6\"}, {\"status\": \"affected\", \"version\": \"12.2.7\"}, {\"status\": \"affected\", \"version\": \"12.2.8\"}]}], \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2019-04-23T18:16:41\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"12.1.1\", \"version_affected\": \"=\"}, {\"version_value\": \"12.1.2\", \"version_affected\": \"=\"}, {\"version_value\": \"12.1.3\", \"version_affected\": \"=\"}, {\"version_value\": \"12.2.3\", \"version_affected\": \"=\"}, {\"version_value\": \"12.2.4\", \"version_affected\": \"=\"}, {\"version_value\": \"12.2.5\", \"version_affected\": \"=\"}, {\"version_value\": \"12.2.6\", \"version_affected\": \"=\"}, {\"version_value\": \"12.2.7\", \"version_affected\": \"=\"}, {\"version_value\": \"12.2.8\", \"version_affected\": \"=\"}]}, \"product_name\": \"Service Contracts\"}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Oracle Service Contracts component of Oracle E-Business Suite (subcomponent: Renewals). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Contracts.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Contracts, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Service Contracts accessible data.\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-2622\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert_us@oracle.com\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2019-2622\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-02T15:45:41.772Z\", \"dateReserved\": \"2018-12-14T00:00:00\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2019-04-23T18:16:41\", \"assignerShortName\": \"oracle\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…