← Back to CVEs
CVE-2019-2904
CRITICAL9.8
Description
Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper and ADF. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper and ADF. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/16/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
oracle:application_testing_suiteoracle:banking_enterprise_collectionsoracle:banking_enterprise_originationsoracle:banking_enterprise_product_manufacturingoracle:banking_platformoracle:business_process_management_suiteoracle:clinicaloracle:communications_diameter_signaling_routeroracle:communications_network_integrityoracle:communications_service_brokeroracle:communications_services_gatekeeperoracle:enterprise_repositoryoracle:financial_services_lending_and_leasingoracle:financial_services_revenue_management_and_billing_analyticsoracle:flexcube_private_bankingoracle:health_sciences_data_management_workbenchoracle:hyperion_planningoracle:rapid_planningoracle:retail_assortment_planningoracle:retail_clearance_optimization_engineoracle:retail_markdown_optimizationoracle:retail_sales_audit
References
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuapr2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuapr2021.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujan2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujul2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuoct2020.html(secalert_us@oracle.com)
https://www.zerodayinitiative.com/advisories/ZDI-19-1024/(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.zerodayinitiative.com/advisories/ZDI-19-1024/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.