Oracle Retail Returns Management 14.0/14.1 Apache Ant exposure of resource

CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.1 | $0-$5k | 0.00 |
A vulnerability was found in Oracle Retail Returns Management 14.0/14.1. It has been classified as critical. Affected is an unknown function of the component Apache Ant. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-668. This is going to have an impact on confidentiality, and integrity. CVE summarizes:
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
The weakness was published 10/19/2021 as Oracle Critical Patch Update Advisory - October 2021. The advisory is available at oracle.com. This vulnerability is traded as CVE-2020-1945 since 12/02/2019. The exploitability is told to be difficult. Local access is required to approach this attack. The successful exploitation requires a authentication. The technical details are unknown and an exploit is not available.
Upgrading eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
Product
Vendor
Name
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.1
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 6.3
NVD Vector: 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
NVD Base Score: 🔒
Exploiting
Class: Information disclosureCWE: CWE-668
ATT&CK: Unknown
Local: Yes
Remote: No
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔒
0-Day Time: 🔒
Exposure Time: 🔒
Upgrade: oracle.com
Timeline
12/02/2019 CVE reserved10/19/2021 Advisory disclosed
10/19/2021 Countermeasure disclosed
10/20/2021 VulDB entry created
10/27/2021 VulDB last update
Sources
Vendor: oracle.comAdvisory: Oracle Critical Patch Update Advisory - October 2021
Status: Confirmed
CVE: CVE-2020-1945 (🔒)
Entry
Created: 10/20/2021 08:11 AMUpdated: 10/27/2021 12:59 AM
Changes: (19) vulnerability_cwe vulnerability_cvss2_nvd_basescore vulnerability_cvss2_nvd_av vulnerability_cvss2_nvd_ac vulnerability_cvss2_nvd_au vulnerability_cvss2_nvd_ci vulnerability_cvss2_nvd_ii vulnerability_cvss2_nvd_ai vulnerability_cvss3_meta_tempscore vulnerability_cvss3_nvd_basescore vulnerability_cvss3_nvd_av vulnerability_cvss3_nvd_ac vulnerability_cvss3_nvd_pr vulnerability_cvss3_nvd_ui vulnerability_cvss3_nvd_s vulnerability_cvss3_nvd_c vulnerability_cvss3_nvd_i vulnerability_cvss3_nvd_a exploit_price_0day
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.