Vulnerability Details : CVE-2018-3151
Vulnerability in the Oracle iProcurement component of Oracle E-Business Suite (subcomponent: E-Content Manager Catalog). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iProcurement. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iProcurement accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability category: Bypass
Products affected by CVE-2018-3151
- cpe:2.3:a:oracle:iprocurement:12.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iprocurement:12.2.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-3151
3.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-3151
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
References for CVE-2018-3151
-
http://www.securityfocus.com/bid/105631
Oracle E-Business Suite Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
CPU Oct 2018Patch;Vendor Advisory
-
http://www.securitytracker.com/id/1041897
Oracle E-Business Suite Multiple Flaws Let Remote Users Access Data and Lets Remote Authenticated Users Modify Data - SecurityTrackerThird Party Advisory;VDB Entry
Jump to