← Retour aux CVEs
CVE-2019-2904
CRITICAL9.8
Description
Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper and ADF. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper and ADF. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/16/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
oracle:application_testing_suiteoracle:banking_enterprise_collectionsoracle:banking_enterprise_originationsoracle:banking_enterprise_product_manufacturingoracle:banking_platformoracle:business_process_management_suiteoracle:clinicaloracle:communications_diameter_signaling_routeroracle:communications_network_integrityoracle:communications_service_brokeroracle:communications_services_gatekeeperoracle:enterprise_repositoryoracle:financial_services_lending_and_leasingoracle:financial_services_revenue_management_and_billing_analyticsoracle:flexcube_private_bankingoracle:health_sciences_data_management_workbenchoracle:hyperion_planningoracle:rapid_planningoracle:retail_assortment_planningoracle:retail_clearance_optimization_engineoracle:retail_markdown_optimizationoracle:retail_sales_audit
References
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuapr2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuapr2021.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujan2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujul2020.html(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpuoct2020.html(secalert_us@oracle.com)
https://www.zerodayinitiative.com/advisories/ZDI-19-1024/(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.zerodayinitiative.com/advisories/ZDI-19-1024/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.