| Title | Oracle Retail Applications の MICROS Retail-J における Database に関する脆弱性 |
|---|---|
| Summary | Oracle Retail Applications の MICROS Retail-J には、Database に関する処理に不備があるため、機密性、完全性、および可用性に影響のある脆弱性が存在します。 |
| Possible impacts | リモート認証されたユーザにより、情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 攻撃が行われる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | July 17, 2018, midnight |
| Registration Date | July 25, 2018, 5:12 p.m. |
| Last Update | July 25, 2018, 5:12 p.m. |
| CVSS3.0 : 警告 | |
| Score | 6.3 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
| CVSS2.0 : 警告 | |
| Score | 6.5 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
| オラクル |
| MICROS Retail-J 11.0.x |
| MICROS Retail-J 12.0.x |
| MICROS Retail-J 12.1.1.x |
| MICROS Retail-J 12.1.2.x |
| MICROS Retail-J 12.1.x |
| MICROS Retail-J 13.1.x |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年07月25日] 掲載 |
July 25, 2018, 5:12 p.m. |
| Summary | Vulnerability in the MICROS Retail-J component of Oracle Retail Applications (subcomponent: Database). Supported versions that are affected are 11.0.x, 12.0.x, 12.1.x, 12.1.1.x, 12.1.2.x and 13.1.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Retail-J. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MICROS Retail-J accessible data as well as unauthorized read access to a subset of MICROS Retail-J accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MICROS Retail-J. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). |
|---|---|
| Publication Date | July 18, 2018, 10:29 p.m. |
| Registration Date | March 1, 2021, 7:23 p.m. |
| Last Update | Nov. 21, 2024, 1:04 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:micros_retail-j:11.0:sp26:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:11.0:sp25:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:11.0:sp24:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.0:sp7:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.0:sp8:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.0:sp9:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.0:sp10:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.0:sp11:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:sp4:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:sp5:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:sp6:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:sp7:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:sp8:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp2_sp6:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp2_sp5:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp2_sp4:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp2_sp3:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp2_sp2:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp1_sp5:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp1_sp4:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp1_sp3:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp1_sp2:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:12.1:fp1_sp1:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:13.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:micros_retail-j:13.1.2:*:*:*:*:*:*:* | |||||