← Volver a CVEs
CVE-2019-2904
CRITICAL9.8
Descripcion
Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper and ADF. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper and ADF. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/16/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
oracle:application_testing_suiteoracle:banking_enterprise_collectionsoracle:banking_enterprise_originationsoracle:banking_enterprise_product_manufacturingoracle:banking_platformoracle:business_process_management_suiteoracle:clinicaloracle:communications_diameter_signaling_routeroracle:communications_network_integrityoracle:communications_service_brokeroracle:communications_services_gatekeeperoracle:enterprise_repositoryoracle:financial_services_lending_and_leasingoracle:financial_services_revenue_management_and_billing_analyticsoracle:flexcube_private_bankingoracle:health_sciences_data_management_workbenchoracle:hyperion_planningoracle:rapid_planningoracle:retail_assortment_planningoracle:retail_clearance_optimization_engineoracle:retail_markdown_optimizationoracle:retail_sales_audit
Referencias
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuapr2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuapr2021.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujan2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujul2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuoct2020.html(secalert_us@oracle.com)
https://www.zerodayinitiative.com/advisories/ZDI-19-1024/(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.zerodayinitiative.com/advisories/ZDI-19-1024/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.